Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...

Ten Signs It’s Time To Review Your Endpoint Protection

To help you distinguish whether your cybersecurity solution is up to the task, download our infographic.

Video/Webcast | Presented by Optiv

Simplifying Security Operations

Determining the most important threats to action is often overwhelming and costly to the company.  The partnership of Optiv and Palo Alto Networks can help.

White Paper | Presented by BeyondTrust

Enable & Secure Your Remote Workforce

Keep Remote Workers Productive Without Sacrificing Security.

White Paper | Presented by Secured Touch

Behavioral Data: The Key to Unlocking Better Fraud Prevention

In this whitepaper, we will take a deep dive into the WHAT, HOW and WHY of behavioral data, and the ways it is helping businesses combat fraud while providing a better user experience.

eBook | Presented by Secured Touch

Breaking Down Fraud Flows

This eBook explores how different types of fraud affect the customer journey, the fraud-flow of the most prevalent fraud use cases, and how using Behavioral Biometrics can stop fraudsters at different stages in the customer journey, without disrupting the customer's experience.

Video/Webcast | Presented by Equinix

Better Together SD WAN and Equinix

In the world of highly distributed workloads and rapid change, SD-WAN and Equinix can be combined to address today’s business needs and position you to tackle tomorrow’s challenges. This video will highlight why your digital strategy should include SD-WAN and Equinix.

White Paper | Presented by Mimecast

Beyond the Perimeter: The Need for Pervasive Email Security

Many organizations are coming up short when protecting against modern email threats.

Build and operationalize machine learning models

Data science and machine learning (ML) have gained prominence in the enterprise digital transformation journey. ML automates decision-making and analytical reasoning capabilities. 

Video/Webcast | Presented by Equinix

Cisco SD WAN Webinar

Worldwide adoption of SD-WAN technology is mushrooming, with 95% of IDC survey respondents expected to deploy SD-WAN within two years. And the reasons are clear. In the face of growing bandwidth requirements, traditional WAN deployments suffer from numerous operational challenges, including the high cost and complexity of expansion.

White Paper | Presented by Mimecast

Cyber Resilience ThinkTank: Transforming the SOC

When you think of a security operations center (SOC), what comes to mind?

Load More