Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

White Paper | Presented by Druva

Analyst Report: Supplementing the Limitations in Office 365

Microsoft set out in Office 365 to provide a robust set of communications, collaboration, security, archiving and other capabilities.. they have succeeded and they continue to build on that success.Read this whitepaper to learn more.

White Paper | Presented by CENTRIFY

Avert a Privilege Crisis with a Zero-Trust approach

Privileged access has become hackers’ brass ring for stealing the most data, most efficiently.

Case Study | Presented by Druva

Case Study: Frontier Silicon Embraces Office 365 Cloud Data Protection

Like many companies, Frontier Silicon is embracing the cost and performance benefits of cloud computing and Software as a Service (SaaS) applications such as Office 365. Read this case study to learn more.

eBook | Presented by Databricks

Conquer the AI Dilemma By Unifying Data Science and Engineering

Enterprises are making significant investments in artificial intelligence (AI) technology. A CIO survey of global data science and engineering leaders across multiple industries found that almost 90% of them are making significant AI investments, but very few are realizing the full benefits of their investments. Learn more.

Miscellaneous | Presented by Nutanix

Driving Digital Transformation in the Supply Chain

Changing consumer expectations and global competition are forcing manufacturers and retailers to rethink their supply chain strategies. Learn how your peers rank the key business drivers for change, what investments they are prioritizing, and how automation helps simplify and accelerate transformation in the supply chain.

Data Sheet | Presented by Druva

Druva inSync - The Industries #1 Cloud Based Protection for Endpoints and Cloud Apps

Workforce mobility today is an essential part of any business, but it creates a number of challenges for IT. Data spread across devices and cloud services, unpredictable schedules, and varied network connections all complicate efforts to protect and govern enterprise information.

White Paper | Presented by CENTRIFY

Gartner Best Practices for Privileged Access Management

Poorly managed privileged access can expose organizations to security breaches and regulatory rebukes, resulting in business losses and financial penalties. Security and risk management leaders must effectively manage privileged access in a risk-aware fashion.

White Paper | Presented by CENTRIFY

KuppingerCole Leadership Compass: Identity as a Service: Single Sign-On to the Cloud

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the market.

Premium Article

Premium Article

White Paper | Presented by Druva

Protecting Your Office 365 Data

Companies across the globe rely on the critical capabilities, flexibility and scale provided by the powerful tools that make up the Office 365 product suite.

Load More