Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

Video/Webcast | Presented by OpenText

Compliance, Convenience, and Confidence: The Three “C”s of the OpenText Life Sciences solutions

2020 and COVID-19 challenged the conservative thinking within Life Sciences and biopharmaceutical organizations. With little notice, they had to rise to rise to some pretty formidable challenges.

White Paper | Presented by PwC

5 key questions when you’re facing a potential breach

Leading companies — even top cybersecurity firms and government agencies — can be vulnerable to sophisticated threat actors. Check out these five key questions that CEOs and boards should be discussing with their CISOs and CIOs.

Sponsor Article | Presented by PwC

Cyber insurance: 6 questions every CEO, CFO and board will inevitably ask — soon

Knowing which questions to ask about cyber insurance can be its own kind of insurance - one that helps prevent you from making the wrong choices. Learn more here.

Sponsor Article | Presented by PwC

Cyber risk quantified. Cyber risk managed.

Quantifying the financial risks of different cyber threats can increase the bang for the cyber buck: it enables you to direct resources to the greatest risks.

eBook | Presented by Splunk

Data Intelligence Key to Sustaining the Telehealth Revolution

How public sector agencies can deliver critical services reliably and securely — even amid uncertainty.

Sponsor Article | Presented by PwC

Does your customer identity and access management (CIAM) inspire trust?

Security and marketing, previously considered strange bedfellows, are a match made in digital heaven with consumer identity and access management (CIAM). Read on to find out why.

ESG Technical Validation: Protecting Critical Data from Cyber Threats

This ESG Technical Validation documents hands-on validation of the Dell EMC PowerProtect Cyber Recovery solution with CyberSense from Dell Technologies.

Analyst Report | Presented by Zimperium

GigaOm’s Radar for Phishing Prevention and Detection, 2020

Download the report to read more and see where Zimperium and 13 other vendors were mapped by GigaOm.

Analyst Report | Presented by Zimperium

IDC MarketScape: Worldwide Mobile Threat Management Software, 2020 Vendor Assessment

Download Zimperium's excerpt from the IDC MarketScape: Worldwide Mobile Threat Management Software, 2020 Vendor Assessment and learn why Zimperium is considered a MTM leader.

Sponsor Article | Presented by PwC

In data we trust: living up to the credo of the 21st century

Data is everything because it is turning business models upside down, while guiding the world through its health and economic challenges. It is not enough, because it is worse than useless—it is a source of risk—unless you can trust it. The answer to this challenge is a data trust strategy: one that simultaneously maximizes data’s ability to create value and minimizes its capacity to destroy it.

Load More