Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

The Passwordless Enterprise: Building A Long-Term Zero Trust Strategy

“The password is dead.” We have heard this statement for at least a decade, yet even in 2019, data breaches based on stolen user credentials continue to dominate the headlines. Why do passwords so stubbornly refuse to die?

Video/Webcast | Presented by Workfront

How to Evolve the IT Function in 5 Simple Steps

The roles of today’s IT leaders are evolving as quickly as the technologies they provide.

Video/Webcast | Presented by Compucom

CIO Insights - Risks vs. Rewards

Join us as we discuss such questions as, what does it mean to be end-user-focused in today’s climate? What rewards come from transforming and modernizing organizations to be more end-user focused?

Consultant's View on Oracle Autonomous Data Warehouse

Hear directly from Richard Winter, CEO and Principal Architect of WinterCorp, on Sept. 10th at 10 am PT for a Live Webcast: Independent Consultant Experiments with Oracle Autonomous Data Warehouse. Learn the results from his own hands-on experiment.

Video/Webcast | Presented by Compucom

End Users in the Era of Digital Transformation

The omni-user is a new breed of employee that needs to have reliable access to their applications and content anywhere, anytime, and on any device – along with a consistent personalized and adaptable user experience.

2018 Gartner Magic Quadrant For WAN Edge Infrastructure

Looking for guidance on narrowing your search for an SD-WAN solution to address your evolving business needs? Watch this webcast to gain the latest insights as Gartner VP Analyst, Andrew Lerner and Silver Peak founder and CEO, David Hughes discuss the characteristics of the new WAN edge infrastructure market and how Silver Peak uniquely addresses these evolving enterprise requirements.

The Passwordless Enterprise: Building A Long-Term Zero Trust Strategy

“The password is dead.” We have heard this statement for at least a decade, yet even in 2019, data breaches based on stolen user credentials continue to dominate the headlines. Why do passwords so stubbornly refuse to die?

The Business Value of an Agile Platform for Developing and Running Applications with OpenShift on AWS

Application development. It’s a critical piece of most organizations. Speed, reliability and security are paramount. An agile and flexible platform for developing applications can be a key competitive advantage.

The Business Value of an Agile Platform for Developing and Running Applications with OpenShift on AWS

Application development. It’s a critical piece of most organizations. Speed, reliability and security are paramount. An agile and flexible platform for developing applications can be a key competitive advantage.

Video/Webcast | Presented by TrustMAPP

Understanding Trust and the Economics of Insecurity

Cyber security is at a pivotal moment in history where more products are available to security teams than ever before yet investments in more cyber security products and services alone does not align a fiscally responsible team with an adequate security posture.

Load More