TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Cyber Threat Intelligence

by OptivAug 25, 2016

Optiv research has identified a key challenge to the impact of cyber threat intelligence: the heavily diluted term "threat intelligence" attaches to a diverse array of products, services and capabilities and is not easily adopted across the various enterprise security use cases. Our experience shows that to solve this challenge, we must understand that intelligence is the connective tissue between knowing your enemy and a security strategy that enables decision advantage to significantly reduce

  • Optiv
  • Cybersecurity
  • Risk Management/Security
  • Details

Cloud Security Software-as-a-Service Solution Primer

by OptivAug 25, 2016

There is absolutely no doubt that enterprises are adopting cloud applications using the Software as a Service (SaaS) model. In fact, recent reports from two leading cloud access security broker (CASB) vendors, Netskope and Skyhigh Networks, both show an astounding average number of applications in use in the enterprise. According to the Netskope February 2016 Worldwide Cloud Report, the average enterprise now has about 917 total cloud applications in use. Skyhigh Networks reports an even higher

  • Optiv
  • Cloud Security
  • Software as a Service
  • Cloud Services
  • Security
  • Details

Understanding the Workspace ONE Secure App Token System

by VMwareAug 22, 2016

Delivering one-touch mobile single sign-on across devices

  • VMware
  • Mobile
  • Mobile Application Management
  • Details

Workspace ONE + Office 365: Enabling More Secure Collaboration

by VMwareAug 22, 2016

In this white paper we'll explore how you can address challenges with Workspace ONE, and enable the secure use of Office 265 across corporate-owned devices, personal devices, or unmanaged devices.

  • VMware
  • Software as a Service
  • Cloud Services
  • Details

Office 365 - Approaches for Optimizing Security

by VMwareAug 22, 2016

Microsoft Office 365 is a cloud-based office productivity suite delivering hosted communication services and collaboration apps and email on user's devices.

  • VMware
  • Database Security
  • Mobile security
  • Details

Leverage Micro-Moments to Unlock Mobile Productivity

by VMwareAug 22, 2016

In this trend brief, we will start by understanding how the VMware usability and design teams were able to better understand the needs of mobile users and adapt our mobile apps to make them look more productive. Then, we'll reflect on what these micro-moments look like for your users, how these moments should influence the development of your business apps, and how the right enterprise platform can help you take the next step to digital transformation.

  • VMware
  • Mobile Application Management
  • Mobile Devices
  • Details

Data Sciences Services

by ZaloniAug 18, 2016

Data science is the art and science of creating business value from big data. For today's enterprises, data science is critical for creating competitive advantage, such as improving operational efficiencies or developing new products and services.

  • Zaloni
  • Software Platforms
  • Big Data Analytics
  • Details

Data Analytics with Hadoop: O'Reilly Ebook

by ZaloniAug 18, 2016

This book is meant as a survey of the Hadoop ecosystem and distributed computation intended to arm data scientists, statisticians, programmers, and folks who are interested in Hadoop with just enough knowledge to make them dangerous.

Use this book as a guide as you dip your toes into the world of Hadoop and find the tools and techniques that interest you the most, be it Spark, Hive, Machine Learning, ETL, Relational Databases, or one of the other many topics related to cluster

  • Zaloni
  • Big Data Analytics
  • Big Data
  • Details

The 5 Characteristics of an Intelligence-Driven SOC

by ThreatConnectAug 17, 2016

Security operations centers (SOCs) must be architected for intelligence, embracing an adaptive security architecture to become context-aware and intelligence-driven. Security leaders should understand how intelligence-driven SOCs use tools, processes and strategies to protect against modern threats. Learn about how you can set up, manage and mature the SOC team in your organization.

  • ThreatConnect
  • Security Monitoring
  • Risk Management/Security
  • Details

6 Easy Ways to Advance Your Cybersecurity Team

by ThreatConnectAug 17, 2016

In this paper, you will learn six easy steps you can take to enhance your ability to ingest, store, and prioritize threat data, develop intelligence-driven processes to automate manual tasks, and streamline your work flow. The right platform (and processes you drive with it) can be a force-multiplier for your small team.

  • ThreatConnect
  • Cybersecurity
  • Security
  • Details