Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

White Paper | Presented by 5Nine Software

5 Signs SCVMM Isn't The Right Fit For Your Datacenter

SCVMM is considered one of the leading Hyper-V management platforms available, but it's not necessarily right for all datacenters. It was supposed to help you get the most out of virtualization-but is it?

Video/Webcast | Presented by DataStax

Accelerating Digital Transformation with Real-Time Applications and Hybrid Cloud

Consumers in the Right-Now Economy demand instant, personalized experiences making "digital" a priority for nearly every enterprise on this planet. At the heart of this digital transformation strategy are real-time, always-on applications and hybrid cloud. So, how do you get there? It all starts with your data.

Video/Webcast | Presented by VMware

Solve Your Citrix Problems with VMware Technologies

Hear from the architect of VMware's Citrix migration & enhancement strategies explain how key VMware technologies such as Horizon, App Volumes, Instant Clone & NSX can help. We will dive deep on how to evaluate the state of the Citrix environment, assess project requirements & review real world scenarios. By the end of the session you will know all about the best-practices, tools & services available to ensure your project is a complete success.

White Paper | Presented by Opsview

The DevOps Manifesto

The idea behind DevOps is picking up steam every day. We used to call it "cross-functional" in traditional enterprise roles. But, why not espouse the benefits of people that can contribute to more than one team in a more meaningful way? This paper talks about the emerging roles within modern IT organizations, and the benefits of encouraging the individuals in those roles to follow their passions and leverage their talents.

White Paper | Presented by QlikTech

10 Ways to Transform Big Data into Big Value

Modern BI solutions can increase the value of Big Data exponentially, by lowering the barrier to entry with user friendly solutions. This allows more people within your organization - not just the data scientists - to access, analyze, and collaborate on your data.

White Paper | Presented by Bitsight

40 Questions You Have in Your Vendor Security Assessment

Our goal with this guide is to help you get started with the creation of your vendor security risk assessment. This is not intended to be an out-of-box security assessment solution, but rather, a guide to get you headed in the right direction. We'll explain the top three frameworks you should be examining, questions you may want to consider (and why you should potentially consider them) and what else to include in your VRM program.

White Paper | Presented by Bitsight

5 Ways Your Vendor Risk Management Program Leaves You In The Dark

Relationships with vendors are important (or even vital) for many organizations, but unfortunately, there's a trade-off - the more data you share, the more risk you acquire. Unfortunately, current risk assessment methods don't paint a complete picture, and they are often biased and insufficient when used alone. Within these pages, we're going to explore how VRM programs often leave you in the dark, and what you can do about it.

Case Study | Presented by Nuance

Bank Leumi transforms authentication with voice biometrics

The First Direct Bank of the Leumi Group, one of the largest banks in Israel, was challenged with the PIN and knowledge-based authentication process used in its contact centers. The verification questions took up to 30 seconds per call, frustrating customers and proving easily answered by imposters.

White Paper | Presented by Nuance

Biometric security boom

Download the "Biometric Security Boom" white paper to learn why leading organizations are turning to highly sophisticated and secure multi-modal biometric authentication technologies to provide customers with a dramatically better experience and realize major efficiency and security gains.

eGuide | Presented by Bitsight

Board-Level Reporting Survival Guide

This Survival Guide offers some advice on how to advance the CSO/CISO-board relationship, and provides some tips that CSO/ CISOs can use to make their seat at the table more secure-and more meaningful to the business.

Load More