TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The 2016 Gartner Magic Quadrant for Web Content Management

by AcquiaSep 29, 2016

Digital is fundamentally changing the way organizations interact and engage with their customers. The 2016 Gartner Magic Quadrant for Web Content Management (WCM) states that "the democratization of [WCM] capabilities has provided greater agility for marketers and enabled WCM to be formally regarded as key to delivering engaging digital experiences to multiple audiences."

Gartner has named Acquia a Leader for the third consecutive year. Acquia enables organizations to offer

  • Acquia
  • Digital Business
  • Executive Insights & Innovation
  • Details

Nothing Kills Attacks Earlier Than DNS-Layer Network Security

by OpenDNSSep 29, 2016

Similar to Amazon learning from shopping patterns to suggest the next purchase, or Pandora learning from music listening patterns to play the next song, OpenDNS learns from Internet activity patterns to identify attacker infrastructure being staged for the next threat.

  • OpenDNS
  • Network & Perimeter Security
  • Security Monitoring
  • Details

Evolve Workload Management with Self-Service

by BMC SoftwareSep 29, 2016

elf-service is becoming part of more areas of business where it aligns with the goals of making the enterprise more agile, responsive, and innovative. The more IT support functions an enterprise automates in this way, the faster it can make progress with more strategic initiatives. For many enterprises, workload management represents an untapped opportunity to automate. It not only supports faster innovation by making more efficient use of IT resources, it benefits business users by giving them

  • BMC Software
  • Software
  • Enterprise
  • Details

5 Signs You Need a Mobile Security Game Plan

by AppthoritySep 28, 2016

Mobile security is on everyone's to do list, but when do you know it's time for your enterprise to have a mobile security game plan? Appthority tackles that question in its lates eBook, 5 Signs You Need a Mobile Security Game Plan.

As mobile devices are used in enterprise environments more often and more extensively, the potential for mobile attacks and the risks to both corporate and personal data continue to increase. Privacy is also at risk as employees are targeted as a means to

  • Appthority
  • Mobile Devices
  • Mobile security
  • Details

Enterprise Mobile Threat Update: Q3 2016

by AppthoritySep 28, 2016

The mobile threat landscape continues to evolve and the Appthority Enterprise Mobile Threat Team monitors trends and important developments in its quarterly threat updates. This quarter's update highlights a growing concern among enterprises around new breeds of mobile threats and shares insights on how changes in app store policies may be affecting the security of applications in enterprise environments.

In this update, we review two major vulnerability types surfacing in Android

  • Appthority
  • Mobile Devices
  • Mobile security
  • Details

Addressing Mobile App Risk: Why Network Traffic Analysis Isn't Enough

by AppthoritySep 28, 2016

Appthority's White Paper, Addressing Mobile App Risk: Why Network Traffic Analysis Isn't Enough identifies key factors that illustrate why enterprises need to go beyond network perimeter security to incorporate mobile security.
Today's enterprise environments is mobile. Forward thinking CISOs and their teams are realizing that, as mobile is increasingly the way we work and play, having a mobile security strategy is as necessary as simply having a security strategy. Soon, in fact, there

  • Appthority
  • Mobile security
  • Mobile Devices
  • Details

Enterprise Mobile: The New Threat Vector

by AppthoritySep 28, 2016

Appthority's White Paper, Enterprise Mobile: The New Threat Vector delves into how employees' mobile devices are undermining your enterprise security efforts. Mobile devices are in fact a silent enabler for ever more successful breaches. Because risky apps on mobile devices leak private data that can be leveraged for spear-phishing or watering hole attacks, and risky apps also send sensitive corporate data to cloud storage or remote servers in locations such as China and Eastern Europe, it may

  • Appthority
  • Mobile Devices
  • Mobile security
  • Details

Hiding in Plain Sight: How a CASB with UBA Unmasks Insider Threats in the Cloud

by PalerraSep 27, 2016

According to IBM's 2015 Cyber Security Intelligence Index, 55% of cyber attacks were due to insiders. Yet, CISOs frequently overlook internal actors and instead focus on protecting their cloud services against external attackers - leaving a huge security gap.

How do you close that gap? Download our white paper to learn how you can implement a Cloud Access Security Broker (CASB) with built-in User Behavior Analytics (UBA) to thwart insider threats before they become costly and public

  • Palerra
  • Cloud Security
  • Security
  • Details

It(T) Matters: The Fuel for Financial Growth

by VMware AirWatch®Sep 26, 2016

Download this Financial Services Digest to learn how leading financial institutions are modernizing IT, securing legacy infrastructure, and speeding application delivery to pave the way for further innovation and business growth.

  • VMware AirWatch®
  • Payments
  • Mobile Devices
  • Core systems
  • Management
  • Details

The Branch of the Future: Connecting Physical Experiences with Digital Capabilities

by VMware AirWatch®Sep 26, 2016

Download this Financial Services Digest to learn how next-generation technology is enhancing financial services' customer experiences worldwide.

  • Mobile Devices
  • VMware AirWatch®
  • Core systems
  • Payments
  • Management
  • Details