Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Gartner 2020 Magic Quadrant for Access Management

As remote work increases access management tool adoption, and security controls shift to identity, the ability to secure access with AM strategies aligned with continuous adaptive risk and trust assessment is paramount.

eBook | Presented by Dataminr

COVID-19: Business Resilience in the Face of the Unexpected

In just a few short months, the COVID-19 pandemic has shown its ability to affect virtually every person on the planet.

White Paper | Presented by OneLogin, Inc.

Guide to Risk-based Authentication Scoring for MFA

Download this cheatsheet for answers to the following questions around how Machine Learning and risk scoring work together to protect your systems from being hacked.

eBook | Presented by OneLogin, Inc.

How Identity and Access Management Can Help Save Your Organization Time, Money, and Resources

It is possible to implement a robust Identity and Access Management (IAM) solution that not only keeps your business secure, but also saves time and money.

eBook | Presented by Dataminr

Understanding and Planning for the Corporate Risk Landscape

Modern risk management is a highly collaborative exercise. Forward-thinking companies know that risk management cannot be confined to a single department or performed on an ad hoc basis inside operational silos—ownership of risk must be shared across the enterprise.

White Paper | Presented by Dataminr

Why “Joined-up” Security Could Help Make Your Business More Secure

Forward-thinking organizations are increasingly blending cybersecurity and physical security teams together.

White Paper | Presented by HP Inc

Advance your Print Ecosystem to the Cloud

HP transitions your entire print ecosystem to the cloud and manages your print software stack. Count on a secure, fully managed printing experience across home, office, public, and shared spaces.

Video/Webcast | Presented by Sonatype

Developer-Driven Security: Owning your projects from inception to commercialization

Triaging and remediating security issues in your projects can be a pain, especially when you’re given a long list of tasks to complete at the end of a deployment. How can we make the build process as seamless as possible for dev teams? Join this session with Maury in a discussion about making developer’s lives easier. Learn how to upgrade components with the least amount of effort, avoid versions that will completely break your project, and how to avoid dangerous components from the get-go.

White Paper | Presented by HP Inc

HP Remote Worker Cybersecurity Best Practices

With the Coronavirus (COVID-19) pandemic affecting so many people, we are reaching out to let you know your safety and security are in our thoughts. Many employees are now working remotely. Just like good hygiene helps ward off COVID-19, it is important to not overlook cybersecurity hygiene. Here are important strategies and tips for protecting employees, systems, and company data during this time, reducing the risk of an accidental or malicious security breach.

White Paper | Presented by HP Inc

Original HP: Secure printer cartridges you can trust

HP incorporates security into every step of the design, supply chain, and production process. By using only Original HP cartridges in your HP device, you can help protect the integrity of your data.

Load More
Popular Resources