Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Jamf

macOS Security Benchmarks: Enforcing CIS, STIG and More to Meet Auditor Standards

When organizations can confidently enforce standardized security requirements and protocols across all endpoints — no matter where they’re located — the risk of a breach or vulnerability drastically diminishes.

macOS Security Benchmarks: Enforcing CIS, STIG and More to Meet Auditor Standards

When organizations can confidently enforce standardized security requirements and protocols across all endpoints — no matter where they’re located — the risk of a breach or vulnerability drastically diminishes.

Virtual Event | Presented by Tidelift

5 Realities of Open Source Software

Watch this webinar on-demand where IDC analyst Al Gillen explains the history of open source support models and his thoughts about the future of open source support. He’s be joined by Tidelift CEO and co-founder Donald Fischer.

CyberArk Blueprint for Privileged Access Management Success

The CyberArk Blueprint for Privileged Access Management Success (or CyberArk Blueprint for short) provides strategic guidance across people, process, and technology domains to develop an effective and mature PAM program.

Lead Gen | Presented by CyberArk Software

Gartner 2020 Magic Quadrant for Privileged Access Management

CyberArk is proud to announce it has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management1 – positioned both highest in ability to execute and furthest in completeness of vision

Lead Gen | Presented by CyberArk Software

Gartner 2020 Magic Quadrant for Privileged Access Management

CyberArk is proud to announce it has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management1 – positioned both highest in ability to execute and furthest in completeness of vision

eBook | Presented by CyberArk Software

Privileged Access Management as a Service for Dummies

Privileged access represents one of the largest security vulnerabilities in today’s digital landscape.

CyberArk Blueprint for Privileged Access Management Success

The CyberArk Blueprint for Privileged Access Management Success (or CyberArk Blueprint for short) provides strategic guidance across people, process, and technology domains to develop an effective and mature PAM program.

White Paper | Presented by Nvidia

AI: 5 Steps to Get Started

Whether you’re starting your first AI project, transitioning a team into AI workloads, or looking at infrastructure blueprints and expansions, these five steps will help set your AI projects up for success.

Video/Webcast | Presented by Citrix

Considering Desktops-as-a-Service with Citrix

Join experts from IDG and Citrix as they explore a timely and reliable solution: Desktops as a service, which enables organizations to securely manage and deliver apps and desktops to workers with a great user experience.

Load More