Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

White Paper | Presented by Egress

Outbound email: Microsoft 365's security blind spot

Microsoft 365 is the world’s go-to productivity platform – but its native security technology is limited in its ability to stop outbound email data breaches.

White Paper | Presented by Egress

Outbound email: Microsoft 365's security blind spot

Microsoft 365 is the world’s go-to productivity platform – but its native security technology is limited in its ability to stop outbound email data breaches.

White Paper | Presented by Egress

Outbound email: Microsoft 365's security blind spot

Microsoft 365 is the world’s go-to productivity platform – but its native security technology is limited in its ability to stop outbound email data breaches.

Video/Webcast | Presented by Splunk

Enhance your Security Detections with Machine Learning

In this talk we will use password spraying as an example use case to showcase how detections can be matured through the use of Machine Learning.

Analyst Report | Presented by IBM

2020 KuppingerCole Leadership Compass for PAM

IBM Security Verify Privilege Vault is powered by technology from Thycotic, an IBM Partner.

Analyst Report | Presented by IBM

2021 KuppingerCole Leadership Compass for Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms.

White Paper | Presented by Splunk

A Brief Guide to a Secure Multicloud Environment

As more organizations are shifting infrastructure and services to the cloud, more are adopting a multicloud strategy.

Miscellaneous | Presented by IBM

CIAM Stakeholder Smartpaper

Consumer Identity and Access Management (CIAM) is an outgrowth from enterprise Identity and Access Management (IAM) that has become a substantial market of its own.

Analyst Report | Presented by IBM

Forrester Total Economic Impact of IBM Security Verify

IBM commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study examining the potential return on investment (ROI) that organizations may realize from deploying IBM Security Verify as an identity-as-a-service (IDaaS) solution in tandem with their on-premises IAM infrastructure.

Analyst Report | Presented by IBM

KuppingerCole Executive View, IBM Security Verify for CIAM, April 2021

IBM Security Verify is an industry-leading Consumer Identity and Access Management (CIAM) solution that can satisfy both B2B and B2C requirements.

Load More