Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Illumio

Unlock Security from the Network: Segmentation Made Simple

This webinar teaches how decoupling security from the network can help improve security posture, increase network performance, and drive business results.

White Paper | Presented by Citrix

The Business Benefits of Enabling the Modern Workspace

In this report, J. Gold Associates explores how a modern workspace helps minimize security issues, decreases the time spent on help desk tickets, boosts employee engagement, and drives a strong return on investment (ROI).

Video/Webcast | Presented by Illumio

Unlock Security from the Network: Segmentation Made Simple

This webinar teaches how decoupling security from the network can help improve security posture, increase network performance, and drive business results.

Video/Webcast | Presented by Illumio

Unlock Security from the Network: Segmentation Made Simple

This webinar teaches how decoupling security from the network can help improve security posture, increase network performance, and drive business results.

Video/Webcast | Presented by Illumio

Unlock Security from the Network: Segmentation Made Simple

This webinar teaches how decoupling security from the network can help improve security posture, increase network performance, and drive business results.

Video/Webcast | Presented by Illumio

Unlock Security from the Network: Segmentation Made Simple

This webinar teaches how decoupling security from the network can help improve security posture, increase network performance, and drive business results.

Case Study | Presented by Etleap

Etleap Data Governance Case Study

Leading security firm reduces risk and unifies data for analysis while meeting GDPR requirements. Etleap and AWS help Okta source data with an analyst-friendly, governed ETL solution.

Fraud, IP Theft and an Intrusion: A Case Study

When you’re faced with an intrusion — whether you were brought in as an outside consultant or are responsible for incident response for your organization — your stakeholders or management ask the same question: What did they take, and how did they get in?

Better Security And Business Outcomes With Security Performance Management

In today’s competitive marketplace, security has become a crucial market differentiator. Companies increasingly realize that security is critical to earning customer trust; securing intellectual property; and protecting the brand.

Building a Security Mindset: Are Your Employees Cyber Savvy?

It takes a combination of technology and training to build a strong security mindset within your organization. Use the tactics outlined here to help your employees identify scams and threats and boost their understanding that vigilance by employees at every level is crucial.

Load More