Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Video/Webcast | Presented by LogMeIn

Top Trends & Technology Impacting Customer Service in 2017

In research conducted by HDI and Robert Half Technology on the technical support center of the future, the key is passion for supporting customers and with social intelligence-a human connection in a digital world.

Video/Webcast | Presented by Barkly

From Floppy Disk to Fileless: How Ransomware is Evolving into the Perfect Crime

Over the past 20 years Ransomware has evolved into the perfect crime. Watch this webinar to learn the history of Ransomware and how Barkly endpoint protection can help stop attacks that can't be detected by file scans and how they can detect new sophisticated attacks by recognizing behavior at a runtime.

Retail Network Security Trends and Threats Report

In this webcast Michael Osterman will share the results of a large survey focused on large retail organizations undertaken by Osterman Research on behalf of Forcepoint.

Video/Webcast | Presented by Cylance

Russia - Cyber Crime and Prevention

Historically, U.S. leadership has kept Russia at arms length. With the new administration come new attitudes toward working with Russia. Since Russia opened up for trade, it has much to offer U.S. companies looking to expand into new markets and tap natural resources. But, is it worth the trouble?

Learn Best Practices of a True Hybrid IT Management Approach

Join leading IT analyst firm Enterprise Management Associates (EMA) live on August 1st @ 1PM EDT for a webinar that will reveal the challenges of managing today's complex IT environments and the benefits associated with moving to a true hybrid IT management approach.

Video/Webcast | Presented by Informatica

The Pivotal CIO: Insights and Best Practices for Leading Data-Driven Digital Transformation

Digital transformation changes our expectations: better service, faster delivery, greater convenience, with less cost. Businesses must transform to stay relevant. Informatica CIO Graeme Thompson and IDG's Rob O'Regan discuss the CIO's new role in leading data-driven transformation, and why and how CIOs must become Chief Transformation Officers.

Kung Fu Panda: Master of Data Security

How does DreamWorks Animation keep its data safe? Hear from Kung Fu Panda himself, Master Po Ping, the Global Chief Protection Officer of DreamWorks Animation. Po may be the "Master of Security", but he gets a little help from Hewlett Packard Enterprise to watch over DreamWorks' data kingdom, where hundreds of employees around the world share confidential digital files.

Video/Webcast | Presented by Level 3

Demystifying the Kill Chain and How to Use Threat Intelligence to Better Protect

New threats are emerging from a broad range of global threat actors. To fight back, you need threat intelligence across all seven levels of the Kill Chain. This webcast explores the best way to gain critical threat intelligence and how to apply it in a layered approach.

Video/Webcast | Presented by InterSystems

The Data Dilemma: The Challenge of Managing Data in Enterprise IT

Join this webinar live on August 8th @ 1PM EDT to hear from IDC's Research Vice President of Data Management Software, Carl Olofson, and InterSystems Director, Partner Programs, Julie Locker for the latest survey data on how this challenge is viewed by more than 500 businesses around the globe. Learn how the third platform is affecting organization's strategy and ability to execute.

Video/Webcast | Presented by Connection

Microsoft Azure - The Cloud Platform for Digital Transformation

This webinar will provide you with the specific capabilities that Azure can provide as the platform for your digital transformation. Connection is a widely respected provider of IT services and solutions with the expertise to help you chart the best course to becoming a digital organization utilizing Azure.

Load More