Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Okta

Okta + SailPoint: A Rip Van Winkle Discussion of Identity Management

Identity has never been more important. From yesterday’s legacy solutions to today's sprawling hybrid IT environment, centralizing and automating identity access, security and governance is a challenge. A modern, identity-aware infrastructure is essential for today’s enterprise to proactively address current and future security risks and compliance needs, while effectively meeting the evolving strategic needs of the business.

Video/Webcast | Presented by DataStax

Top 10 Best Practices for Apache Cassandra™ and DataStax Enterprise

In this on-demand webinar, Jeff Carpenter is going to share with you exactly how to get started in the right direction — and stay on the path to a successful database launch.

Video/Webcast | Presented by IBM

Vetting Your Apps: The App Approval Workflow Webinar

Mobile applications have become a part of our everyday lives. We use them to get where we’re going, stay in constant communication with others, and get the info we need to remain productive. Apps are no longer a novelty for today’s workforce – they’re a necessity. And with that necessity comes risks. Just like any enterprise technology, security measures must be taken to prevent data loss, threats, and breaches.

Video/Webcast | Presented by IBM

Webinar: IBM Joins Google in Announcing Android Enterprise Recommended Program for EMMs

IBM MaaS360 with Watson has been named by GoogleTM as an Android Enterprise Recommended solution for corporate, BYOD, and dedicated devices.

Video/Webcast | Presented by IBM

Webinar: Wandera + MaaS360: Delivering Security and Management for Mobile Data

Mobile devices have transformed the enterprise for the better, however they’ve also created new and difficult challenges for IT and Security leaders. Mobile attacks are increasingly widespread and phishing threats continue to target distracted mobile users to steal valuable credentials.

Video/Webcast | Presented by OpenText

Internet of Things (IoT) Solutions for Digital Twins

The digital twin – a digital representation of a physical object – is one of the best examples of truly harnessing the power of enterprise information and the Internet of Things (IoT). Its demand is exploding along with the practical applications for business growth.

AMD EPYC-Based Dell EMC PowerEdge 14G Servers

Many of today’s datacenter workloads require more than traditional processor architectures are providing. AMD’s EPYC Enterprise CPUs together with Dell EMC PowerEdge servers provide the compute, memory bandwidth and IO that software defined, virtualized and High Performance computing applications crave. With unprecedented levels of compute, memory, IO, and security capabilities, learn how AMD EPYC based Dell EMC PowerEdge servers are redefining datacenters rules, improving performance and adding competitive value to your business.

Digital Innovation Webinar

Watch this webinar to get started with your digital innovation transformation today.

Achieving High-Fidelity Security by Combining Packet and Endpoint Data

No one source can provide all of the data necessary for security monitoring. To be truly effective, organizations need better relevant data, and they need it faster. Early detection of infiltration and compromise are key to rapid and accurate response and recovery.

Video/Webcast | Presented by Insight

Developing a Cloud Governance Model

This webinar will review the key issues in Cloud Governance, and how they should be evaluated. You’ll learn how to put a reference framework and policies in place for effective Cloud Governance as well as how to make effective decisions on setting up and securing cloud environments.

Load More
Popular Resources