Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

Case Study | Presented by ServiceNow Inc

Novant Health uses machine learning to streamline IT workflows

See how Novant Health created a single system for tracking support incidents, requests, products, and investments with ServiceNow.

Case Study | Presented by Centercode Inc

Centercode & Tableau Case Study

Tableau leverages Centercode to increase beta team productivity by 100%.

Better Security And Business Outcomes With Security Performance

Learn how to mitigate risk and generating revenue with metrics that matter.

Case Study | Presented by Zscaler

Nuffield Health secures 142+ locations

The Nuffield Health IT team was about to undertake a number of projects to improve productivity, efficiency, and patient services, while enhancing the user experience in its corporate office, hospitals, and gyms.

The Evolving Role of the CISO

The role of the Chief Information Security Officer (CISO) is clearly evolving.

Case Study | Presented by Benefitfocus

BENEFITFOCUS® Success Story: Regence BCBS

Learn how one of the country’s largest Blues plans partnered with Benefitfocus’ MarketPlace Exchange to increase efficiency, improve data quality and deliver ROI

Case Study | Presented by Neustar Inc

Case study: Learn about a number of organizations' experience with Neustar

DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere.

Case Study | Presented by Appetize

Cincinnati Museum Center Increases Order Size by 20% with Self-Service Solutions

With an outdated Point of Sale system, Cincinnati Museum Center operators knew it was time to partner with Appetize.

Case Study | Presented by One Identity

Case study: Cavium enables secure access to privileged credentials with One Identity Safeguard

The majority of headlines about cybersecurity failures center on the theft or loss of customer or citizen information, and larceny linked to money.

Case Study | Presented by Dragos

ICS Threat Detection: 4 Types, Defined by Application

The following case studies provide guidance for defenders on detection types and their applications so threats can be found and defeated earlier.

Load More