Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

White Paper | Presented by Navex

4 Steps to Jumpstart Compliance with CMMC

Late last year the Department of Defense  (DoD) rolled out the Cybersecurity Maturity Model Certification (CMMC) program.

White Paper | Presented by Navex

4 Things to Know About Updated NIST 800-53 Standards

In September 2020 the National Institute of Standards and Technology (NIST) unveiled the fifth version of its cybersecurity standard formally known as SP 800-53, “Security and Privacy Controls for Information Systems and Organizations.”

eBook | Presented by NetApp

Buyer’s Guide eBook: Give your Oracle database superpowers

How do you choose the right solution to modernize your Oracle infrastructure? You don’t need to find a phone booth or start hanging around radioactive spiders. You just need our buyer’s guide.  

White Paper | Presented by Deep Instinct

Cyber Threat Report: Pandemic Chaos Unleashes Malware Disaster

Deep Instinct’s 2020 Cyber Threat Landscape report — analysis of major in-the-wild attacks and observations of hackers’ changing trends and tactics. Discover the Top 5 common malware threats, and how to protect your company.

White Paper | Presented by Deep Instinct

Cyber Threat Report: Pandemic Chaos Unleashes Malware Disaster

Deep Instinct’s 2020 Cyber Threat Landscape report — analysis of major in-the-wild attacks and observations of hackers’ changing trends and tactics. Discover the Top 5 common malware threats, and how to protect your company.

Video/Webcast | Presented by AvePoint

Data Protection in the Cloud: 7 Critical Office 365 Data Restore Questions (And Answers)

It’s not enough to just consider Office 365 backup.  Organizations need a plan to restore critical information– and it isn’t a one-size-fits-all process. 

Data Stack Modernization in the Cloud

Accelerate the modernization and migration of your data stack to the cloud with Persistent’s proven expertise underpinned with automated migration accelerators. Get TCO visibility and cost control all through the journey.

White Paper | Presented by Deep Instinct

Deep Instinct Security Buyer's Guide

When choosing a cybersecurity vendor, it’s essential to understand their philosophy, methodologies, and unique attributes. This Buyer's Guide will ease the purchase process by highlighting Deep Instinct’s prevention-first approach and cybersecurity solutions.

White Paper | Presented by Deep Instinct

Deep Instinct Security Buyer's Guide

When choosing a cybersecurity vendor, it’s essential to understand their philosophy, methodologies, and unique attributes. This Buyer's Guide will ease the purchase process by highlighting Deep Instinct’s prevention-first approach and cybersecurity solutions.

White Paper | Presented by Cloudian

Eight Storage Requirements for AI and Deep Learning

This paper delivers eight specific storage requirements of AI and DL applications and why they demand the data management capabilities supplied by enterprise object storage solutions.

Load More