Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

cw non geeks primary

Computerworld’s guide to working with non-geeks

Geeks and non-geeks often work at cross-purposes or simply misunderstand each other's motives. This collection of columns from Paul Glen can help the two sides bridge the gap that separates them.

White Paper | Presented by LogRhythm

A Framework to Surface Cyber Threats via Security Intelligence

The Security Intelligence Maturity Model™ (SIMM) provides a systematic guide for an organization to assess and actively achieve a heightened security posture. Find out where your organization sits on the SIMM and identify gaps that need to be filled.

Video/Webcast | Presented by Dell Inc.

Converged Systems For Modern Datacenters

One of the key developments driving the modern data center is the growing use of converged systems.

White Paper | Presented by LogRhythm

Magic Quadrant for Security Information and Event Management

LogRhythm positioned in leaders quadrant of Gartner's 2014 SIEM Magic Quadrant Report for the 3rd consecutive year. The Magic Quadrant is a yearly analysis of the SIEM market that examines market driving innovations & compares leading competitors.

The Rising Popularity of Unified Communications in the Cloud

Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.

White Paper | Presented by LogRhythm

Understanding the Advanced Persistent Threat

Due to the difficulty of detection, APTs are a growing concern in the security industry. Traditional security tools must be combined with Security Intelligence to properly detect and respond to APTs.

Video/Webcast | Presented by HP

Data-Centric Security & Encryption: Keeping Your Critical Data Safe

Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.

Video/Webcast | Presented by HP

Incident Response - What Is (and Isn't) Working Today

This two-part webcast will focus on what is and isn't working for incident responders, what they can do about it, and how they can become more proactive in responding to incidents.

White Paper | Presented by IBM

7 Reasons You Need Predictive Analytics Today

Learn why advanced analytics tools are essential to sustain a competitive advantage.

White Paper | Presented by Dell | Eaton

Batteries - the heart of your UPS

Before the days of sealed, maintenance-free batteries, you could check the battery's electrolyte with a hydrometer to determine its ability to retain a charge.

Load More