Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

2020 Data Threat Report - Global Edition

The cloud and digital transformation are putting enterprises’ sensitive data at risk. This report is based on a global IDC web-based survey of 1,723 executives with responsibility for or influence over IT and data security. Read about the problems, and what to do about them.

Quantum computing & quantum-safe security

This paper looks at the implications of quantum computing on the cybersecurity landscape. Finally, this paper explains the need for organizations to embrace crypto-agility within their encryption solutions, so that they remain secure both today, and in the post-quantum era.

Build a strong foundation for data privacy and security

In organizations that are complex or have siloes of data, the lack of a clear view of sensitive data can make it very difficult to apply effective policies and controls to protect this most critical asset. This ever-evolving regulatory landscape leaves companies to interpret and comply with a growing patchwork of state, global, and industry-specific data privacy and security laws, creating significant risks for compliance.

eBook | Presented by Thales eSecurity

2020 Access Management Index Research Report

The 2020 Access Management Index research report surveys over 300 industry professionals in and Brazil with responsibility for, or influence over, IT and data security. This guide tracks trends, vulnerablilities and options for securing and optimizing your Access Management Solutions.

eBook | Presented by Thales eSecurity

Access Management Handbook

Over the years, you may have heard a lot about access management. In fact, we tended to use the terms “authentication” and “access management” pretty much to mean the same thing. But in fact there are differences between the two. While authentication validates a user’s identity, access management determines that a user has the permission to access a certain resource and enforces the access policy that has been set up for that resource.

2020 Access Management Index Report- Infographic

The 2020 Access Management Index research report surveys over 300 industry professionals in and Brazil with responsibility for, or influence over, IT and data security. This visual guide will provide you insight into trends, vulnerablilities and options for securing and optimizing your Access Management Solutions.

CipherTrust Data Discovery and Classification from Thales

CipherTrust Data Discovery and Classification (DDC) helps your organization get complete visibility into your sensitive data with efficient data discovery, classification, and risk analysis across heterogeneous data stores - the cloud, big data, and traditional environments - in your enterprise.