Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Java, enterprise integration and open source Java.

Filter the library by ...

White Paper | Presented by Smarsh

5 Steps to Eradicate Text Messaging Risk

Good electronic discovery (eDiscovery) practices and the technologies that support them are an essential best practice for any organization. Enabling organizations to search and produce relevant content in the event of litigation minimizes legal risk and reduces the likelihood that an organization can't satisfy a request for information in the appropriate form and timeframe. Download this whitepaper to learn more.

eBook | Presented by Smarsh

The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day

These days, it's not enough for your organization to address damage to your reputation after it is already done. You must spot potential risk as soon as possible prevent it from spiraling out of control. Download our ebook to see what a dreadful, horrid, inefficient, very bad day might look life in the life of a Chief Risk Officer - and how you can avoid one yourself.

White Paper | Presented by Smarsh

The Financial Advisor's Guide to Social Media Strategy and Policy

The SEC and FINRA recognize social media's growing role in firms' marketing and communications strategies, and have provided guidance on extending compliance programs for this dynamic channel. This guide contains practical steps that will help you develop a social media strategy that meets record keeping and supervision requirements while gaining maximum business value from your social efforts.

eBook | Presented by Safebreach

Breach and Attack Simulation Primer

This brief overview provides a light description about Breach and Attack Simulation, and how it can continuously validate your security.

White Paper | Presented by Safebreach

Get more from your next-generation firewall (NGFW)

Next-gen firewalls are deployed in nearly every enterprise, but too often they aren't protecting as well as they could. Whether through outdated policy, or simple misconfiguration, many next-gen firewalls are leaving holes for attackers to exploit. These are often simple to fix, and require no further investment. Read this paper to see common errors that introduce risk - and how to address them.

Slideshow | Presented by Sprint Business

Here's the Thing... The Internet of Things is Already Changing Businesses

The Internet of Things stopped being just an idea a long, long time ago. View this Slideshare to learn more about how the Internet of Things is disrupting businesses, and why yours should be one of them.

Video/Webcast | Presented by One Identity

Identity analytics - a more collective defense

When it comes to reducing identity-related risks, identity analytics is a logical addition to an organization's larger IAM arsenal. Solutions have been primarily focused on the area of behavior analytics - i.e., looking at what type of behavior occurred and the reasoning behind this behavior. However, they should also be focused on identity analytics and reducing risk before bad behavior impacts the business.

eBook | Presented by One Identity

Identity Analytics - A more comprehensive defense in the battle to reduce risk and enhance security

Almost every company has instances of users who have inappropriate entitlements because they are improperly provisioned or because they change roles and the old permissions are not de-provisioned. There's a great deal of risk associated with inappropriate or excessive rights, and bad actors love to exploit this. IT security teams must take a more proactive stance to reduce identity-related risk. Now they can.

Join This Webinar: Enabling 360-degree Business Insights with SAP Data

Join leading IT analyst firm Enterprise Management Associates (EMA) and Attunity for a discussion on how organizations are overcoming inherent challenges to enable SAP data-driven initiatives and meet the analytics goals of their organization with modern data integration and management

Video/Webcast | Presented by One Identity

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

There's a great deal of risk associated with inappropriate or excessive rights, and when bad actors get into your network, they love to exploit these over-permissioned accounts. Identity analytics enhances your existing IAM investment by providing a comprehensive defense for your battle to reduce risk and enhance security.

Load More