Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

White Paper | Presented by Quest Software

Preparing for Attacks that Seek Total Annihilation

This white paper reviews some of the most destructive recent attacks, analyzes their speed, scope and methodology, and explores the best strategies for defending your organization.

eBook | Presented by Quest Software

Top 10 Security Events to Monitor in Azure Active Directory and Office 365

This eBook highlights ten security events that administrators track closely to keep their Azure AD and Office 365 environment secure.

Video/Webcast | Presented by OpenText

CCPA vs GDPR: Five Things to Do Now to Prepare for the Toughest US Privacy Law

The impact the GDPR has made in the data privacy world cannot be overstated. Since it came into effect May 2018, many countries and regions have followed suit to reform their existing or introduce new privacy laws. Currently the US does not have federal level privacy legislation however the recently introduced CCPA represents the most stringent data protection regulation in the country and one that will impact organizations globally.

How To Use Smarter Security At The Edge To Mitigating Common Adversarial Tactics And Techniques

The flow of breach news never seems to stop. The most common question any security leader then asks is - Are we vulnerable to a similar attack? That often results in a scramble to answer that question.

eBook | Presented by Quest Software

Surviving Common Office 365 Security Pitfalls — Is Your On-Premises AD the Weakest Link?

This eBook will identify steps for prepping the on-premise AD for synchronization with Azure AD, protecting data during migration and offer best practices for maintaining a more secure hybrid environment.

White Paper | Presented by Salt Stack

SaltStack SecOps: Automated, universal IT system compliance and security enforcement

Security and IT operations teams must work together to keep modern data centers compliant and secure, but their efforts are often crippled by disparate toolsets, misaligned workflows, and competing priorities. It’s time for that to change. SaltStack SecOps is a new solution that harnesses SaltStack’s event-driven automation technology to deliver full-service, closed-loop automation for compliance and security. With SaltStack SecOps, security professionals and operations teams can work together to define a compliance policy, scan all systems against it, detect issues, and actively remediate them—all from a single platform.

Case Study | Presented by Salt Stack

IBM Cloud Customer Spotlight

IBM uses SaltStack as a global command and control layer that provides comprehensive audit, remote execution, automation, patch, and security detection and remediation for the IBM Cloud network.

eGuide | Presented by Data Theorem

App and API Security

Security—for your applications and for the APIs that make them understandable. You can’t live without it, especially in these days of rapid development and ever-evolving threats. Our eGuide will give you a quick overview and some ideas for improving your own company’s stance.

Respond to business risks in real-time with integrated risk management

The financial and legal penalties that could result from noncompliance make it imperative to invest in transforming outdated GRC processes.

White Paper | Presented by ServiceNow Inc

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)

From cutting costs to reducing risks and problems, there are many benefits to automating GRC.

Load More