Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics.

Filter the library by ...
CLEAR

White Paper | Presented by Symantec

Three secrets to becoming a mobile security superhero

How to Select, Implement and Succeed with Mobile Threat Defense. This report provides three critical 'secrets' that may help buy-in from business leaders about mobile cyber security. Ultimately, the goal is to gain consensus about adopting modern, advanced cyber security technologies built from the ground up to protect mobile devices with all the efficacy of cyber security for traditional endpoints.

White Paper | Presented by Cofense

Malware Review

Like any threat, malware evolves. To stay in front of ransomware, credentials theft, and more, download the Cofense Malware Review. Get insights from Cofense Intelligence on how the malware is steadily changing. Discover the trends and what to prioritize for defending your network.

White Paper | Presented by Cofense

Phishing Response Trends

With the number of phishing attacks at 1,220,523, a 65% increase over the previous year,1 it’s no wonder we find ourselves in a war against phishing. So, are organizations winning the war or just holding ground? The findings of our reports overwhelmingly suggest the latter.

2018 Global Data Risk Report

Discover some of the concerning security trends from this past year, highlighting warning signs of cyberattacks and data security risks that shouldn’t be ignored: including statistics on stale data and sensitive files, permissions creep and access control issues, outdated security policies, and more

White Paper | Presented by Logi Analytics

2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? Many application teams don't realize that the features they embed and how they develop them have a lasting impact on revenue, customer retention, and competitive differentiation. We surveyed 500 application teams embedding analytics to find out what separates successful projects from failed ones.

7 Best Practices for Data Security in Office 365 and Beyond

We are in the midst of a global shift from purely on-premises IT infrastructure to hybrid environments. Office 365 is dominating the cloud, yet its native security is lacking unified controls required to protect the billions of sensitive files that flow between internal storage and the cloud.

White Paper | Presented by Carbonite

Carbonite: A cornerstone for Ransomware Protection & Recovery

In this special guide, we’ll detail the ransomware problem – how it works and what it does to corrupt data, how you can help reduce your exposure to ransomware attacks, and how Carbonite and EVault’s market-leading backup and recovery solutions give you peace of mind.

White Paper | Presented by Logicalis

Cisco Hybrid Cloud Platform for Google Cloud

You want to take advantage of all the new innovations in application development and delivery, from public cloud to containers and microservices, to make the most of your applications. But until now that’s meant having to choose between development on premises or in the public cloud ‒ having to compromise with monolithic “stacks” or being challenged to “glue” different parts together.

White Paper | Presented by Logicalis

Empowering the CIO: Enterprise Technology Designed to Speed Innovation

The idea economy and technological innovation have made the role of the chief information officer (CIO) more demanding and handed business units more control over information technology (IT) spending. This trend can lead to CIOs becoming less relevant to the business.

White Paper | Presented by Logicalis

Logicalis Global CIO Survey 2017–2018

Simplify, secure and engage: CIOs say massive infrastructure overhaul must be coupled with culture change if organizations are to unlock the benefits of digital transformation.

Load More