Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like IT, enterprise integration and open source.

Filter the library by ...

Video: Return to the Office Tour with Zoom

Take a tour of the Zoom office and see how Zoom is innovating to make your return to the office safe, productive, and exciting.

Video/Webcast | Presented by Nutanix

Three Paths to True Hybrid cloud EUC

Join us for this session as we discuss the three potential paths to achieve a hybrid EUC deployment.

Video/Webcast | Presented by SoftwareOne

Top 5 Tips in CyberSecurity

This webinar will provide the information you need to take the next step on your cloud management journey. 

Video/Webcast | Presented by Commvault

Ransomware Lessons Learned from the field

Join experts from Commvault and Meridian Group International as they relate the stories from 2 customers and how they each weathered an attack.

Video/Webcast | Presented by Kaseya

Developing and Implementing an Effective Patch Management Policy

Watch this webcast to learn more! Don’t miss this chance to hear from the experts!

Video/Webcast | Presented by D2iQ

Modernizing Kubernetes, Security, and App Development

The Future of Security and App Development.

Video/Webcast | Presented by Nira

The Hidden Access Risks in Google Workspace

In this webinar, security experts Bob Bragdon, SVP of CSO at Foundry and Hiten Shah, the CEO and co-founder of Nira, discuss these hidden risks and how best to mitigate them.

Zero Trust with Workspace & Beyondcorp

Users and organizations are creating more sensitive data and information than ever before.

The Modernizing Network. 5 Principles To Drive Digital Transformation

Hear what a customer has had to say about their implementation of NaaS and learn how this model of network consumption is emerging to help overcome management obstacles and accelerate digital and network transformations.

Breaking Down Highly Evasive Adaptive Threats

How can cybersecurity leaders overcome their concerns surrounding ransomware? Watch this video to see Menlo Security’s Senior Director of Cybersecurity Strategy, Mark Guntrip, define HEAT attack in less than two minutes.

Load More