Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics.

Filter the library by ...
CLEAR

White Paper | Presented by OpenText

eBook: Digital Manufacturing

Read the Digital Manufacturing eBook to discover the 8 trending challenges for the factory of the future, 36 stories of innovation, 40 insights from executive of top manufacturing organizations and much more.

White Paper | Presented by OneSpan

User Identification and Authentication for E-Signature Transactions

Authentication helps to ensure enforceability of the e-signed record and directly impacts customer experience. Executed well, user authentication builds trust and loyalty. Done poorly, it can lead to frustration and abandonment.

White Paper | Presented by Symantec

Three secrets to becoming a mobile security superhero

How to Select, Implement and Succeed with Mobile Threat Defense. This report provides three critical 'secrets' that may help buy-in from business leaders about mobile cyber security. Ultimately, the goal is to gain consensus about adopting modern, advanced cyber security technologies built from the ground up to protect mobile devices with all the efficacy of cyber security for traditional endpoints.

Mobile Threat Intelligence Report

This report reviews worldwide threat intelligence data collected by the SEP Mobile Research Team, from globally-deployed mobile security agents and millions of monthly security tests from January through December 2017.

eBook | Presented by SelectHub

Top Business Intelligence Software—Definitive Pricing Guide 2018

Get an in-depth comparison of the costs and implementation models for the top-rated BI solutions. This practical guide helps buyers compare the cost factors and product limitations of the most popular BI software.

eBook | Presented by SelectHub

Top ERP for Manufacturing 2018—Expert Reviews and Pricing—Free Analyst Report

Interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects.

White Paper | Presented by Cofense

Malware Review

Like any threat, malware evolves. To stay in front of ransomware, credentials theft, and more, download the Cofense Malware Review. Get insights from Cofense Intelligence on how the malware is steadily changing. Discover the trends and what to prioritize for defending your network.

White Paper | Presented by Cofense

Phishing Response Trends

With the number of phishing attacks at 1,220,523, a 65% increase over the previous year,1 it’s no wonder we find ourselves in a war against phishing. So, are organizations winning the war or just holding ground? The findings of our reports overwhelmingly suggest the latter.

2018 Global Data Risk Report

Discover some of the concerning security trends from this past year, highlighting warning signs of cyberattacks and data security risks that shouldn’t be ignored: including statistics on stale data and sensitive files, permissions creep and access control issues, outdated security policies, and more

White Paper | Presented by Logi Analytics

2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? Many application teams don't realize that the features they embed and how they develop them have a lasting impact on revenue, customer retention, and competitive differentiation. We surveyed 500 application teams embedding analytics to find out what separates successful projects from failed ones.

Load More