Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics.

Filter the library by ...
CLEAR

eBook | Presented by Extreme Networks

5 Essential Elements of the 80211ac Wave 2 Business Case

Fueled by big expectations for increased Wi-Fi performance, the excitement around Wave 2 of 802.11ac comes as no surprise. After reading this eBook, you will not only be the most knowledgeable voice in the room, you'll also be well equipped to justify your upgrade to the 802.11ac Wave 2 standard.

eBook | Presented by Extreme Networks

Find and Control Any Application in Your Enterprise Network

This eBook will explain how the ExtremeAnalytics Platform uses the industry's first flow-based technology to deliver unprecedented network application insights for every network environment - helping enterprises control what's on their network and prepare for future threats.

eBook | Presented by Smarsh

The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day

These days, it's not enough for your organization to address damage to your reputation after it is already done. You must spot potential risk as soon as possible prevent it from spiraling out of control. Download our ebook to see what a dreadful, horrid, inefficient, very bad day might look life in the life of a Chief Risk Officer - and how you can avoid one yourself.

eBook | Presented by Safebreach

Breach and Attack Simulation Primer

This brief overview provides a light description about Breach and Attack Simulation, and how it can continuously validate your security.

eBook | Presented by One Identity

Identity Analytics - A more comprehensive defense in the battle to reduce risk and enhance security

Almost every company has instances of users who have inappropriate entitlements because they are improperly provisioned or because they change roles and the old permissions are not de-provisioned. There's a great deal of risk associated with inappropriate or excessive rights, and bad actors love to exploit this. IT security teams must take a more proactive stance to reduce identity-related risk. Now they can.

eBook | Presented by Citrix Systems Inc

Enabling the Distributed Enterprise with SD-WAN Customer Stories

Discover how Citrix customers are redefining their distributed Enterprise networks with NetScaler SD-WAN.

eBook | Presented by One Identity

Future-Proof Your Tactical IAM Projects.

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

eBook | Presented by One Identity

Future-Ready Identity and Access Management

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

eBook | Presented by One Identity

IAM for the Real World Access Management

Access is usually the highest priority when taking on IAM challenges, but how do you do it most effectively? In this e-book, you'll discover: today's key challenges for effective access management; the most common identity administration principles; the significant benefits that can come from getting to one identity.

eBook | Presented by One Identity

Identity and Access Management for the Real World The Fundamentals

This short e-book "Identity and Access Management for the Real World" evaluates what IAM for the real world would, should and can look like, including best practices. It delves into the most pressing identity management and access management issues faced by virtually every organization and offers actionable, affordable and sustainable best practices for the IAM challenges you face.

Load More