TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Leverage Micro-Moments to Unlock Mobile Productivity

by VMwareAug 22, 2016

In this trend brief, we will start by understanding how the VMware usability and design teams were able to better understand the needs of mobile users and adapt our mobile apps to make them look more productive. Then, we'll reflect on what these micro-moments look like for your users, how these moments should influence the development of your business apps, and how the right enterprise platform can help you take the next step to digital transformation.

  • VMware
  • Mobile Application Management
  • Mobile Devices
  • Details

Office 365 - Approaches for Optimizing Security

by VMwareAug 22, 2016

Microsoft Office 365 is a cloud-based office productivity suite delivering hosted communication services and collaboration apps and email on user's devices.

  • VMware
  • Database Security
  • Mobile security
  • Details

Workspace ONE + Office 365: Enabling More Secure Collaboration

by VMwareAug 22, 2016

In this white paper we'll explore how you can address challenges with Workspace ONE, and enable the secure use of Office 265 across corporate-owned devices, personal devices, or unmanaged devices.

  • VMware
  • Software as a Service
  • Cloud Services
  • Details

Understanding the Workspace ONE Secure App Token System

by VMwareAug 22, 2016

Delivering one-touch mobile single sign-on across devices

  • VMware
  • Mobile
  • Mobile Application Management
  • Details

Data Analytics with Hadoop: O'Reilly Ebook

by ZaloniAug 18, 2016

This book is meant as a survey of the Hadoop ecosystem and distributed computation intended to arm data scientists, statisticians, programmers, and folks who are interested in Hadoop with just enough knowledge to make them dangerous.

Use this book as a guide as you dip your toes into the world of Hadoop and find the tools and techniques that interest you the most, be it Spark, Hive, Machine Learning, ETL, Relational Databases, or one of the other many topics related to cluster

  • Zaloni
  • Big Data Analytics
  • Big Data
  • Details

Data Sciences Services

by ZaloniAug 18, 2016

Data science is the art and science of creating business value from big data. For today's enterprises, data science is critical for creating competitive advantage, such as improving operational efficiencies or developing new products and services.

  • Zaloni
  • Software Platforms
  • Big Data Analytics
  • Details

6 Easy Ways to Advance Your Cybersecurity Team

by ThreatConnectAug 17, 2016

In this paper, you will learn six easy steps you can take to enhance your ability to ingest, store, and prioritize threat data, develop intelligence-driven processes to automate manual tasks, and streamline your work flow. The right platform (and processes you drive with it) can be a force-multiplier for your small team.

  • ThreatConnect
  • Cybersecurity
  • Security
  • Details

The 5 Characteristics of an Intelligence-Driven SOC

by ThreatConnectAug 17, 2016

Security operations centers (SOCs) must be architected for intelligence, embracing an adaptive security architecture to become context-aware and intelligence-driven. Security leaders should understand how intelligence-driven SOCs use tools, processes and strategies to protect against modern threats. Learn about how you can set up, manage and mature the SOC team in your organization.

  • ThreatConnect
  • Security Monitoring
  • Risk Management/Security
  • Details

Costa protects its fast-growing online business with vigilant cybersecurity

by Arctic WolfAug 16, 2016

Why Costa trusts AWN CyberSOC to protect its fast-growing online business.

  • Arctic Wolf
  • Security
  • Cybersecurity
  • Details

Gartner Report: The Five Models of Security Operation Centers

by Arctic WolfAug 16, 2016

Gartner outlines the five models of Security Operation Centers and provides practical guidance to CISOs planning to build a SOC capability.

  • Arctic Wolf
  • Security
  • Cybersecurity
  • Details