UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Securosis: Security and Privacy on the Encrypted Network

by Blue CoatMay 22, 2015

Get sound advice from Securosis, a specialist in information security research and analysis. Read the new white paper, "Security and Privacy on the Encrypted Network," that explores multiple issues of securing the encrypted network.

  • Blue Coat
  • Security Monitoring
  • Security Management & Analytics
  • Details

Encrypted Traffic Management E-Guide

by Blue CoatMay 22, 2015

According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to speed with Blue Coat's Interactive E-guide to Encrypted Traffic Management.

  • Blue Coat
  • Security Monitoring
  • Security Management & Analytics
  • Details

ESG: Network Encryption and Security

by Blue CoatMay 22, 2015

Enterprise organizations are encrypting more of their network traffic. This is a mixed blessing in that it can protect data confidentiality and integrity but it also opens a camouflaged threat vector back into the organization. This New study from ESG describes the growth of encryption and strategies for protection.

  • Blue Coat
  • Security Monitoring
  • Endpoint Security
  • Details

Encrypted Traffic Management for Dummies eBook

by Blue CoatMay 22, 2015

Malware hiding in SSL/TLS has become an urgent priority for security executives. It's time for a better approach to manage encrypted traffic. Read "Enterprise Traffic Management for Dummies," a new e-book brought to you by Blue Coat.

  • Blue Coat
  • Security Monitoring
  • Security Management & Analytics
  • Details

Market Overview: Vulnerability Management

by NopSecMay 21, 2015

Exploiting vulnerabilities in applications, browsers, and operating systems is often the first step in compromising a target. Research demonstrates that staying on top of new threats and vulnerabilities was a top priority for technology decision makers in 2014 and for the three years prior. But despite increased investment, security and risk professionals continue to struggle with addressing them.

This analyst report by Forrester takes a look at the current state of vulnerability

  • Risk Management/Security
  • Security Monitoring
  • Details

Vulnerability Threat Management in 2015

by NopSecMay 21, 2015

In recent years, vulnerability threat management has become merely a means to help document system compliance with industry or government regulations. Between existing technologies creating information overload and an extensive list of manual tasks, the remediation process has broken down. In some industries, the average time to fix a vulnerability is 176 days. As a result, the window of opportunity for hackers remains wide open.

Download the latest report from 451 Research and

  • Risk Management/Security
  • Security Management & Analytics
  • Details

5 Ways UC Makes IT a Hero

by XO CommunicationsMay 20, 2015

Prior to the arrival of UC, the stereotype was that IT departments were focused on blinking lights and server upgrades. UC has demolished that stereotype. IT departments now are responsible for deploying the most productive, effective, and collaborative tool set we've ever seen in business communications.

  • XO Communications
  • Software Developers
  • IT Strategy
  • Details

Tablet Comparison Guide

by Dell / Intel®May 20, 2015

Finding the right tablet for full office productivity can be a challenge. Your tablet should be able to do whatever you need, with whatever software you want, while integrating with back-end systems. Finally, you have several ideal choices that bring flexibility, ease of management, professional capability, and near-universal compatibility in the latest Dell Venue Pro models.

Be sure to read "Tablet Comparison e-Guide," a comprehensive guide to understanding the unique benefits of

  • Dell
  • Mobile Devices
  • Mobile Application Management
  • Details

Challenges in Managing a Hybrid Cloud

by CarpathiaMay 20, 2015

Learn more about the difficulties behind multi-cloud management and how businesses can simplify the process with Carpathia's brand new tool in this infographic.

  • Carpathia
  • Cloud Services
  • Cloud
  • Details

Mobility Myth Busting: BYOD, Tablets and Mobile Apps

by Dell / Intel®May 20, 2015

Mobile technology may be reshaping our business strategy, but many organizations are mired in antiquated thinking about mobility that keeps them from realizing its full potential. We expose three mobility myths and lay bare the truth about implementing an effective mobile strategy.

  • Dell
  • Mobile Devices
  • Mobile
  • Details