UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Mid-Market Mayem: Cybercriminals Wreak Havoc Beyond Big Enterprises

by ThreatTrack SecurityMay 29, 2015

Breaches at large enterprises grab headlines, but cybercriminals are developing a taste for smaller businesses. The mid-market (companies with 500 to 2,500 employees) is becoming fertile ground for cybercriminals looking to exploit unsuspecting organizations with valuable data to steal and much more to lose.

  • ThreatTrack Security
  • Security Monitoring
  • Security Management & Analytics
  • Details

Stop Malware, Stop Breaches? How to Add Value Through Malware Analysis

by ThreatTrack SecurityMay 29, 2015

The shortage of qualified security personnel, increases in the costs for safeguarding networks, and the exponential increase in Web-based attacks dictate a shift in the ways malware defense must be organized and then carefully administered.

  • ThreatTrack Security
  • Security Monitoring
  • Risk Management/Security
  • Details

Isolation Architectures for Motor Control Systems

by Analog Devices IncMay 27, 2015

Webcast Overview:
This webcast discusses different system isolation topologies, such isolated current sense, driving high performance isolated gate drivers and overall system partitioning of the isolation architecture used in motor control. It highlights the advantages and board offerings covering motor control systems such as servo solutions with a focus on high performance. The presenter shows how ADI's board and system services speed up overall design flow. Who should attend:

  • Industrial/Robotics/Motor Control
  • Details

How to Use Continuous Delivery to Accelerate Speed to Value

by CA TechnologiesMay 27, 2015

Continuous delivery is an agile approach to software production with DevOps, where bottlenecks are removed to improve software development and deployment processes. But it goes much deeper than this, involving automated builds, integration, and testing so you can reliably deliver consistent product revisions to your end customers. Deeper still, it involves the creation of parallel pipelines within your organization, where all changes are tracked from conception to release for each contributor,


Alert Logic Cloud Security Report

by Alert LogicMay 27, 2015

In early 2012, Alert Logic launched the first in a series of reports on cloud security, with the goal of creating the IT industry's first assessment of security in the cloud for businesses considering the use of cloud computing platforms. Alert Logic's approach to these assessments, based on data associated with a large concentration of cloud workloads-i.e., the Alert Logic customer base- has proven to be a pragmatic way of gaining insight into the evolving state of security in the cloud.


The People Problem: Cyber Threats Aren't Just a Technology Challenge

by ThreatTrack SecurityMay 26, 2015

Let's face it. Humans are the weakest link in cybersecurity. Human error contributes to at least 95% of all security incidents. This paper explores the challenges with managing the human element and outlines seven steps you can take to improve your security posture.

  • ThreatTrack Security
  • Security Monitoring
  • Security Management & Analytics
  • Details

Building the Business Case for Tablets in the Enterprise

by Dell / Intel®May 26, 2015

Despite an initially strong acceptance of tablet PC's in the consumer market, growth rates have recently tapered due to the emergence of large-screen smartphones and inexpensive notebooks. But enterprise adoption of tablets appears poised for a surge with research indicating that tablets can, and do, drive worker productivity in a variety of vertical industries. Take a look at how these lightweight but fully-featured devices powered by Intel® Core™ vPro™ processors can deliver

  • Dell
  • Mobile Devices
  • Mobile Application Management
  • Details

Dell Tablets: A Winning Combination of PC Performance and Portability

by Dell / Intel®May 26, 2015

To deliver its potential, your business needs a thriving workforce -- one that is empowered to be creative, productive, and efficient. Employees expect a convenient, reliable, and frictionless user experience on their primary device, but IT must ensure that the technology meets considerations such as cost, reliability, security and much more. Take a look at how a new breed of enterprise-grade tablets powered with Intel® technology can offer the best of all worlds, meeting the demands of

  • Dell
  • Mobile Devices
  • Mobile Application Management
  • Details

Top Six Things to Consider with an Identity as a Service Solution

by CentrifyMay 26, 2015

The amount of apps, passwords, and identities that your employees need to manage every day can really stunt productivity. IT doesn't like it either. After all, they're just trying to ensure the security of your enterprise but they're often burdened with password retrieval activities when they could be focused on more value-added tasks. Because your employee have work to do, and they're suffering from password fatigue, they resort to using passwords that circumvent security

  • Centrify
  • Software
  • Enterprise
  • Details