Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

2020 Access Management Index Report- Infographic

The 2020 Access Management Index research report surveys over 300 industry professionals in and Brazil with responsibility for, or influence over, IT and data security. This visual guide will provide you insight into trends, vulnerablilities and options for securing and optimizing your Access Management Solutions.

2020 Access Management Index Research Report

The 2020 Access Management Index research report surveys over 300 industry professionals in and Brazil with responsibility for, or influence over, IT and data security. This guide tracks trends, vulnerablilities and options for securing and optimizing your Access Management Solutions.

2020 Data Threat Report - Global Edition

The cloud and digital transformation are putting enterprises’ sensitive data at risk. This report is based on a global IDC web-based survey of 1,723 executives with responsibility for or influence over IT and data security. Read about the problems, and what to do about them.

Access Management Handbook

Over the years, you may have heard a lot about access management. In fact, we tended to use the terms “authentication” and “access management” pretty much to mean the same thing. But in fact there are differences between the two. While authentication validates a user’s identity, access management determines that a user has the permission to access a certain resource and enforces the access policy that has been set up for that resource.

Build a strong foundation for data privacy and security

In organizations that are complex or have siloes of data, the lack of a clear view of sensitive data can make it very difficult to apply effective policies and controls to protect this most critical asset. This ever-evolving regulatory landscape leaves companies to interpret and comply with a growing patchwork of state, global, and industry-specific data privacy and security laws, creating significant risks for compliance.

CipherTrust Data Discovery and Classification from Thales

CipherTrust Data Discovery and Classification (DDC) helps your organization get complete visibility into your sensitive data with efficient data discovery, classification, and risk analysis across heterogeneous data stores - the cloud, big data, and traditional environments - in your enterprise.

Quantum computing & quantum-safe security

This paper looks at the implications of quantum computing on the cybersecurity landscape. Finally, this paper explains the need for organizations to embrace crypto-agility within their encryption solutions, so that they remain secure both today, and in the post-quantum era.

HPE Datacenter Care for High Performance Computing

High performance computing is used to solve the world’s most complex problems and drive discoveries and innovation for the future, advancing the way people live and work. But complexity is getting in the way. You can find HPC IT, in almost every industry, enabling discoveries and invention. This IT environment needs to be fast, at the optimum performance levels, and always on.

Introduction to Code Churn

In this guide, we’ll unpack what code churn is, what it isn’t, and what to do when you notice an unexpected spike in the metric.

Video/Webcast | Presented by IBM

Your Opportunity at the Edge: A Checklist for Success

In today’s uncertain economic times, many customers are scrambling to keep their business operating – not only enabling remote collaboration for work at home, but also identifying solutions that allow for the rapid but controlled development, enhancement, and governance of innovative new services.

Load More