TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Monitoring Employee Productivity in a Roaming Workplace

by VeriatoJan 17, 2017

Many companies today are allowing employees to work remotely. But how do you know if your remote employees are being productive?

  • Veriato
  • Security Monitoring
  • Security Management & Analytics
  • Details

Building Hyper-Scale Data Centers at Hyper-Speed

by Cyrus OneJan 17, 2017

Learn how CyrusOne is "Building Hyper-Scale Data Centers at Hyper-Speed," and consider how your enterprise can leverage the benefits of CyrusOne's record-breaking speed-to market construction solutions.

  • Cyrus One
  • Data centers
  • Infrastructure
  • Details

HPC Solutions in High Density Data Centers

by Cyrus OneJan 17, 2017

Learn how forward-thinking CIOs are significantly reducing production costs and increasing profit margins with high performance computing in world-class, high density data centers.

  • Cyrus One
  • Data centers
  • Storage
  • Details

What keeps CIOs up at night?

by Murano SoftwareJan 16, 2017

While it used to be an ancillary part of the business, IT is now taking on a central strategic role that touches every facet of the business. With data breaches making daily news headlines and the near-constant pressure to stay on top of the latest best practices, it's a formidable challenge for the CIO who is expected to do more and more in an increasingly demanding environment, with less money to pay for it. While cyber security certainly leads the way among top priorities that keep CIOs

  • Murano Software
  • Cybersecurity
  • Security
  • Details

Transforming Systems Management for Digital Business

by BMC SoftwareJan 11, 2017

Today, every business is a digital business. Customers expect mobile and web applications to be available at any time, day or night. Mainframes provide the foundation for these digital interactions, and they must support a huge and growing number of transactions. This paper examines how a true mainframe systems management solution can help companies meet the bigger, faster needs of a digital business while reducing costs.

  • BMC Software
  • Software Platforms
  • Big Data Analytics
  • Details

TLS/SSL: Be Wary of What Travels Inside

by NSS LabsJan 11, 2017

Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command and control, and data exfiltration. This paper examines the malicious use of encryption, including statistics, details on encrypted threats, and analysis of encrypted attack vendors.

  • NSS Labs
  • Security Management & Analytics
  • Security Monitoring
  • Details

TLS/SSL: Where Are We Today?

by NSS LabsJan 11, 2017

Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network performance burdens for organizations that wish to inspect encrypted traffic. This technical brief examines current industry adoption of encryption and what is driving the increase in encrypted web traffic and websites.

  • NSS Labs
  • Security Management & Analytics
  • Security Monitoring
  • Details

Breach Detection Systems: Product Selection Guide

by NSS LabsJan 11, 2017

Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such as security effectiveness, deployment options, performance, and administrative capabilities, as well as other metrics, such as time to detect threats and system visibility. This guide provides a comprehensive look at leading BDS products and highlights what enterprises should consider during product evaluation.

  • NSS Labs
  • Security platforms
  • Security Monitoring
  • Details

Advanced Endpoint Protection: When Should an Enterprise Move to AEP?

by NSS LabsJan 11, 2017

Advanced endpoint protection (AEP) products are still relatively immature, which makes it difficult to decide whether to replace or augment existing endpoint protection (EPP). Adding to the difficulty is assessing AEP products is the fact that measuring some of their features can be complicated. This guide provides details on product selection criteria: which features are important, and why.

  • NSS Labs
  • Endpoint Security
  • Security platforms
  • Details

Advanced Endpoint Protection: Strategic Guidance

by NSS LabsJan 11, 2017

Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining which AEP product is the best fit can be challenging. This guide provides analysis on product category definitions and preliminary decision criteria.

  • NSS Labs
  • Endpoint Security
  • Security Management & Analytics
  • Details