Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

...or search.
Video/Webcast | Presented by HP

Collaboration 2.0 Death of the Web Conference (As We Know It)

Tune into this webinar from Join.me by Log.me.in to learn how this instant online meeting app went viral because it makes collaborating easier than ever.

White Paper | Presented by Citrix Systems

10 Essential Elements for a Secure Enterprise Mobility Strategy

Best practices for protecting sensitive business information while making people productive from anywhere.

2014 Trends That Will Reshape Organizational Security

This report provides the background, rationale and advice for realigning organizational security in light of the evolving cybersecurity and business landscape. Security managers should compare these trends against their own environments.

White Paper | Presented by HP

3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight applies these techniques to spot and stop attacks.

White Paper | Presented by Xirrus

5 Steps to a Killer Wi-Fi Network Infographic

There are 5 components, and we've even created a handy infographic to help illustrate how you can optimize your Wi-Fi network.

White Paper | Presented by Xirrus

802.11ac Infographic

802.11ac is a new very high throughput Wi-Fi standard (final approval in 2014). It delivers data rates in excess of 1Gbps in its first phase of products with future iterations planned to take performance to nearly 7Gbps.

White Paper | Presented by Xirrus

802.11ac Technology Brief

Stay ahead of the curve and learn about the new 802.11ac Wi-Fi standard.

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack

Methods that rely exclusively on detection and blocking to prevent cybercrime are no longer adequate. It's time for a new security model to address the full attack continuum - before, during, and after an attack.

White Paper | Presented by SAS

A Marketer's Guide to Analytics

This paper is designed to give managers and other marketing professionals an introduction to applying analytics to marketing so you can significantly improve outcomes.

White Paper | Presented by Box

An Alternative to Today's Distributed Content Security Chaos

Today's complex IT architecture is expanded with cloud and mobile computing. ESG believes it's time for CIOs and CISOs to take a long look at centralized cloud-based content management services.

Load More