Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like IT, enterprise integration and open source.

Filter the library by ...
CLEAR

Cyber Security in Financial Services: A Complex Threat Requiring a Comprehensive Strategy SPON

Financial professionals and financial services firms face unprecedented challenges and risks when it comes to cyber security.

Keeper Security Research Report: Crossing the Password Chasm

Keeper Security surveyed 383 people, most of whom specialize in the technology field. The good news is that the survey found confidence in password security and password managers remains high.

Key Issues for eDiscovery and Legal Compliance

Good electronic discovery (eDiscovery) practices and the technologies that support them are an essential best practice for any organization. This white paper presents an overview of key eDiscovery issues, provides a list of best practices, and presents some of the results from an in-depth survey of decision makers and influencers at mid-sized and large organizations.

Password Management Evaluation Guide for Businesses

Weak passwords are at the heart of the rise in cyber theft, causing 76% of data breaches. To mitigate this risk, businesses are adopting password management solutions. This is a comprehensive password management evaluation guide with recommended security, implementation and productivity requirements.

eBook | Presented by Keeper Security

Password Management For Dummies eBook

Password Management For Dummies, Keeper Security Special Edition, shows you what you need to know about password management systems that can greatly improve online security in your business and personal lift.

Password Management Perspectives with Securosis Analyst Adrian Lane

Adrian Lane, a security Strategist at Securosis and Mitch Rosen, Sales Engineer at Keeper Security discuss the best practices for password encryption, protection and maintenance. Passwords continue to be problematic for companies as they are necessary and easiest to hack. Companies need to reconsider password policies particularly with the advent of mobile devices and the proclivity of remote users.

The Internet of Things and Enterprise Networks: Planning, Engineering, and Operational Strategies

In a new research study, "The Internet of Things and Enterprise Networks: Planning, Engineering, and Operational Strategies," leading IT analyst firm EMA explores the strategic role the network team plays in enterprise IoT initiatives. Join us May 3rd @ 10AM PDT/ 1PM EDT for a webinar that will explore the results of this research.

Trial Download | Presented by SelectHub

Top BI Software Reviews & Pricing 2017- Free Analyst Report

This interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects. Get everything you need to make the right decision here!

White Paper | Presented by Smarsh

Digital Record Management for Government

State, federal, and local government agencies need to keep important records (including digital communications) for a long time, to stay in compliance with public records laws, open meeting, Freedom of Information Act (FOIA), and various state sunshine laws. If an agency has email, social media, web and other digital communications related to business activities, records must be available to anyone who asks for them.

White Paper | Presented by Smarsh

The Government Social Media Survival Guide

Public sector organizations have a lot to offer the communities they serve through social media. Updates on your website or items on your city council meeting agenda can now foster real-time interaction with your constituents.

Load More