Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Five Ways to Protect Your Digital Assets

Without the right backup and recovery strategies, there are a number of threats that could bring your business to a halt. Follow the five-step path illustrated in this infographic to ensure business continuity.

White Paper | Presented by TechData & HPE

How IoT Will Impact Our Society

Some call the Internet of Things (IoT) the Intelligence of Things or the Internet of Everything. By whatever name, futurists say it heralds the moment when sensor-driven data connects everything to everything else and artificial and human intelligence become a seamless whole - the planet and virtually everything in and on it transformed into a single, thinking entity.

Video/Webcast | Presented by Okta

IAM's Place in your Breach Prevention Strategy

In recent years data breaches have become a common occurrence. What's more surprising is how consistently these breaches occur. It's not just the usual suspects of phishing, social engineering and insider threats; weak and stolen passwords are the majority cause (81% of the time per Verizon's DBIR).

Kung Fu Panda: Master of Data Security

How does DreamWorks Animation keep its data safe? Hear from Kung Fu Panda himself, Master Po Ping, the Global Chief Protection Officer of DreamWorks Animation. Po may be the "Master of Security", but he gets a little help from Hewlett Packard Enterprise to watch over DreamWorks' data kingdom, where hundreds of employees around the world share confidential digital files.

Video/Webcast | Presented by Level 3

Demystifying the Kill Chain and How to Use Threat Intelligence to Better Protect

New threats are emerging from a broad range of global threat actors. To fight back, you need threat intelligence across all seven levels of the Kill Chain. This webcast explores the best way to gain critical threat intelligence and how to apply it in a layered approach.

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

Be it malicious or well-intentioned, the most hazardous use of 'Shadow IT' is probably the simplest. Storing files in the cloud using cloud-sync applications is common practice for backing up or sharing files with co-workers. While these tools are believed to be secure, the true point of failure is the 'Insider Threat,' and only true visibility and a preventive approach can unmask the threat and mitigate the risk.

White Paper | Presented by Sophos

Protect Your Remote Desktop Users From Malware With An Outbound Gateway Protection On Aws

More and more organizations are moving to AWS to capture the benefits of the cloud, including scalability, reduced TCO, and the flexibility of AWS services to meet unique business needs. A vital component of operating on AWS, however, is ensuring data and workloads hosted on AWS are secure.

Report: The Mobile Enterprise: Where the Risk is Bigger Than Malware and Phishing

Read the "Spectrum of Mobile Risk" data-based report which will provide you a comprehensive overview of the real-world risk landscape facing organizations like yours. You'll learn the types of mobile threats and vulnerabilities that put your organization at risk, how app behaviors and configurations pose an unseen risk to your enterprise and how to begin evaluating your organization's spectrum of risk today.

Case Study | Presented by Sophos

Sophos Enables ATLO Software to Launch Groundbreaking, Evolutionary Workforce Development

Sophos UTM helps customers by providing an easy to use, all-in-one, network security solution. By leveraging Sophos UTM and Amazon Virtual Private Cloud (Amazon VPC), organizations are able to build an Outbound Gateway (OGW) to enforce user-defined security policies, acceptable use, and help prevent remote desktops from malware infections.

The Enemy Within - Insiders Are Still the Weakest Link in Your Data Security Chain

IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014. Follow our guidelines to safeguard your business from potential threats.

Load More