Tech Digital Resource Library

Access the latest white papers, research, webinars, case studies, reports, and more covering a wide range of enterprise information technology topics.

Showing results 31 - 60 of 137
Showing results 31 - 60 of 137

Filter by

Filters

Building the Business Case for Quantifying Cyber Risk

Building the Business Case for Quantifying Cyber Risk

Cyber risk quantification allows you to tie cyber risk to business impact and communicate it in a language everyone can understand: financial impact.

Building the Business Case for Quantifying Cyber Risk

Cyber risk quantification allows you to tie cyber risk to business impact and communicate it in a language everyone can understand: financial impact.
LogicGate
Compromised credentials in 2024: What to know about the world's #1 attack vector

Compromised credentials in 2024: What to know about the world's #1 attack vector

Available On-Demand

Compromised credentials in 2024: What to know about the world's #1 attack vector

Available On-Demand
Lacework
Energy Efficiency Drives Many HPC Users to the Cloud

Energy Efficiency Drives Many HPC Users to the Cloud

Brought to you by AWS

Energy Efficiency Drives Many HPC Users to the Cloud

Brought to you by AWS
AWS and NVIDIA
5 Ways to Make the Shift to Proactive IT

5 Ways to Make the Shift to Proactive IT

Brought to you by Lakeside Software

5 Ways to Make the Shift to Proactive IT

Brought to you by Lakeside Software
Lakeside Software
AI That Speaks IT: Better Data, Better Results

AI That Speaks IT: Better Data, Better Results

Brought to you by Lakeside Software

AI That Speaks IT: Better Data, Better Results

Brought to you by Lakeside Software
Lakeside Software
How XLAs, Proactive IT Make the Difference at LexisNexis

How XLAs, Proactive IT Make the Difference at LexisNexis

Brought to you by Lakeside Software

How XLAs, Proactive IT Make the Difference at LexisNexis

Brought to you by Lakeside Software
Lakeside Software
The Essential Role of Data and Data Quality in IT-related AI Model Training

The Essential Role of Data and Data Quality in IT-related AI Model Training

Brought to you by Lakeside Software

The Essential Role of Data and Data Quality in IT-related AI Model Training

Brought to you by Lakeside Software
Lakeside Software
What's Hiding in your IT Estate?

What's Hiding in your IT Estate?

Brought to you by Lakeside Software

What's Hiding in your IT Estate?

Brought to you by Lakeside Software
Lakeside Software
Arius Enterprise

Arius Enterprise

Brought to you by Milliman

Arius Enterprise

Brought to you by Milliman
Milliman Arius
Automate to Accelerate: Overcoming Staffing & Compliance Challenges in Cyber Risk Management

Automate to Accelerate: Overcoming Staffing & Compliance Challenges in Cyber Risk Management

Brought to you by LogicGate

Automate to Accelerate: Overcoming Staffing & Compliance Challenges in Cyber Risk Management

Brought to you by LogicGate
LogicGate
Discover 11 Ways to Streamline SEC Cybersecurity Compliance

Discover 11 Ways to Streamline SEC Cybersecurity Compliance

Ensure a smooth transition to SEC cyber rules.

Discover 11 Ways to Streamline SEC Cybersecurity Compliance

Ensure a smooth transition to SEC cyber rules.
LogicGate
The CIO's Guide to IT Automation in 2024: Enabling Innovation & Efficiency

The CIO's Guide to IT Automation in 2024: Enabling Innovation & Efficiency

Available On-Demand

The CIO's Guide to IT Automation in 2024: Enabling Innovation & Efficiency

Available On-Demand
TeamDynamix
The Forrester Wave™: Q4 2023 Governance, Risk, And Compliance Platforms

The Forrester Wave™: Q4 2023 Governance, Risk, And Compliance Platforms

Brought to you by LogicGate

The Forrester Wave™: Q4 2023 Governance, Risk, And Compliance Platforms

Brought to you by LogicGate
LogicGate
Behind the Scenes: How to Make End Users Happy with Seamless IT

Behind the Scenes: How to Make End Users Happy with Seamless IT

Available On-Demand

Behind the Scenes: How to Make End Users Happy with Seamless IT

Available On-Demand
Automox
Deciphering Cloud Signals: Analysis of Cloud Trends

Deciphering Cloud Signals: Analysis of Cloud Trends

Brought to you by InformationWeek!

Deciphering Cloud Signals: Analysis of Cloud Trends

Brought to you by InformationWeek!
InformationWeek
Making Enterprise Service a Reality

Making Enterprise Service a Reality

Available On-Demand

Making Enterprise Service a Reality

Available On-Demand
TeamDynamix
Cyber Resilience in 2024:    Availability is Your Best Ability

Cyber Resilience in 2024: Availability is Your Best Ability

May 2, 2024 at 11 AM EST | A Sponsored Virtual Event Brought to you by InformationWeek and ITPro Today

Cyber Resilience in 2024: Availability is Your Best Ability

May 2, 2024 at 11 AM EST | A Sponsored Virtual Event Brought to you by InformationWeek and ITPro Today
InformationWeek and ITPro Today
The CISO's Guide to the Software Supply Chain

The CISO's Guide to the Software Supply Chain

Available On-Demand

The CISO's Guide to the Software Supply Chain

Available On-Demand
JFrog
The Vital Connection Between Cyber Resiliency & Enterprise Backup and Recovery

The Vital Connection Between Cyber Resiliency & Enterprise Backup and Recovery

Available On-Demand | Brought to you by Rubrik

The Vital Connection Between Cyber Resiliency & Enterprise Backup and Recovery

Available On-Demand | Brought to you by Rubrik
Rubrik
Edge Computing Bridges IT and OT People, Process, and Technology

Edge Computing Bridges IT and OT People, Process, and Technology

Organizations moving towards IT/OT convergence are leveraging scalable and reliable Edge Computing platforms to help manage and integrate data, improve cybersecurity, enhance uptime and fault tolerance, modernize infrastructure, and more. Learn more in our new whitepaper.

Edge Computing Bridges IT and OT People, Process, and Technology

Organizations moving towards IT/OT convergence are leveraging scalable and reliable Edge Computing platforms to help manage and integrate data, improve cybersecurity, enhance uptime and fault tolerance, modernize infrastructure, and more. Learn more in our new whitepaper.
Stratus Technologies
Radical Automation of ITSM

Radical Automation of ITSM

Available On-Demand

Radical Automation of ITSM

Available On-Demand
TeamDynamix
2024 IT Enterprise Insights: Key Findings and Content Guide

2024 IT Enterprise Insights: Key Findings and Content Guide

Brought to you by InformationWeek!

2024 IT Enterprise Insights: Key Findings and Content Guide

Brought to you by InformationWeek!
InformationWeek
2024 Trends to Watch: CIO

2024 Trends to Watch: CIO

Brought to you by InformationWeek!

2024 Trends to Watch: CIO

Brought to you by InformationWeek!
InformationWeek
2024 Trends to Watch: Enterprise IT

2024 Trends to Watch: Enterprise IT

Brought to you by InformationWeek!

2024 Trends to Watch: Enterprise IT

Brought to you by InformationWeek!
InformationWeek
Automox's Annual State of ITOps Report Review: The Journey to Agility in 2024

Automox's Annual State of ITOps Report Review: The Journey to Agility in 2024

Available On-Demand

Automox's Annual State of ITOps Report Review: The Journey to Agility in 2024

Available On-Demand
Automox
Unleashing AI for cybersecurity: Empowering non-experts to take action

Unleashing AI for cybersecurity: Empowering non-experts to take action

Available On-Demand

Unleashing AI for cybersecurity: Empowering non-experts to take action

Available On-Demand
Mandiant - Now part of Google Cloud
Strategies for Maximizing IT Automation

Strategies for Maximizing IT Automation

March 28, 2024 at 11 AM EST | A Sponsored Virtual Event Brought to you by InformationWeek and ITPro Today

Strategies for Maximizing IT Automation

March 28, 2024 at 11 AM EST | A Sponsored Virtual Event Brought to you by InformationWeek and ITPro Today
InformationWeek and ITPro Today
Enterprises' Biggest Obstacles to Maintaining Cyber Resiliency

Enterprises' Biggest Obstacles to Maintaining Cyber Resiliency

What is cyber resiliency? How can it be maintained?

Enterprises' Biggest Obstacles to Maintaining Cyber Resiliency

What is cyber resiliency? How can it be maintained?
InformationWeek
Using Security Automation to Solve Workforce Shortages, Alert Fatigue, and More

Using Security Automation to Solve Workforce Shortages, Alert Fatigue, and More

Automation has great potential to boost productivity levels and competitiveness, while cutting costs.

Using Security Automation to Solve Workforce Shortages, Alert Fatigue, and More

Automation has great potential to boost productivity levels and competitiveness, while cutting costs.
InformationWeek
Empower Your Oracle Databases - Enhancing Protection Against All Threats

Empower Your Oracle Databases - Enhancing Protection Against All Threats

Available On-Demand

Empower Your Oracle Databases - Enhancing Protection Against All Threats

Available On-Demand
Rubrik
Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.