Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

White Paper | Presented by Quest

2 Steps to Achieve Endpoint Compliance with KACE

Be ready for the next audit with KACE.

White Paper | Presented by Quest

5 Steps to Battle Endpoint Cybercrime with Kace

The KACE SMA reduces the burden on your IT staff by automatically carrying out software distributions and software upgrades across multiple locations. Read this whitepaper to learn more!

eBook | Presented by Cisco Meraki

How Manufacturers Can Secure Everyone and Everything

Technology’s reach throughout manufacturing has never been more apparent, and its holistic role makes security more critical than ever.

IDC Paper: Five Key Technologies for Enabling a Cyber Resilience Framework

This white paper further describes how cyber-resilience practices can help enterprises defend against those risks and recover from breach or failure in a controlled, measurable way.

White Paper | Presented by Quest

Quest® KACE® SMA reduces software license compliance stress

This white paper explores how the inventory, software metering and reporting capabilities in the Quest® KACE™ Systems Management Appliance (SMA) can help with software asset management, making software license optimization and compliance an easy-to-obtain reality across all types of endpoints.

White Paper | Presented by Quest

Simple, Secure Mobile Device Management from Quest

This white paper unravels the complexities of mobile endpoint management and explains the risks of not protecting your mobile device fleet.

Technical brief: IBM Cloud Resiliency Consulting Services

Realign your resilience strategy for maximum adaptability and risk mitigation.

8 Controls to Thwart Sunburst and Other Supply Chain Attacks

Learn Gartner’s 12 steps and security controls of the SolarWinds attack that can be deployed to detect and possibly block the attack. Learn why Gartner finds network detection and response (NDR) necessary to defend against these types of attacks.

Breaking down the SolarWinds breach: an inside look at the methods used

The recent SolarWinds Orion hack infected an estimated 18,000 organizations. It demonstrates the need for a network detection and response (NDR) solution when taking steps to detect breaches that have bypassed preventative security, and to protect data. Network-based technologies are critical when countering the increasing sophistication of threats.

Cloud Identity Detections with Azure AD

Learn how Vectra provides complete cloud-to-ground security coverage, including an organization’s entire software-as-a-service (SaaS) ecosystem. This single configuration integration effectively puts an end to lateral movement no matter the account type, location or privilege.

Load More