Filter the library by ...

video/webcast | Presented by OpenText

HIMSS18 - What's Your Digital Maturity Path for Patient Information Exchange?

Join Amy Perry, Director of Product Marketing at OpenText to explore how healthcare organizations can transition from inefficient paper-based fax to digital. Learn about how solutions like RightFax can simplify, extend, and accelerate your path to digital maturity during this webinar - and to secure your spot with an OpenText expert at HIMSS 2018 by booking a one-on-one meeting today.

white paper | Presented by Viavi

Troubleshooting OSI Layers 4-7

In this two-part white paper series, learn to quickly locate and resolve problems across the OSI layers using the Troubleshooting Cheat Sheet. The root cause of application anomalies don't stop at Layer 3 of the Open Systems Interconnection (OSI) model. In fact, some of the most difficult to diagnose service issues are rooted in, or manifest themselves at the Transport Layer (Layer 4) or higher.

white paper | Presented by Appian | KPMG

Delivering ROI with Enterprise Automation

Today's enterprises are under pressure to transform digitally. But IT leaders don't necessarily feel ready. In a recent Gartner study, 59% of the participating IT professionals said their IT organization is unprepared for the digital business of the next two years. Fortunately, the right enterprise automation strategy can provide companies with the flexibility and speed to build compelling apps and deliver unified customer experiences.

video/webcast | Presented by Knowbe4

Phishing and Social Engineering in 2018: Is the Worst Yet to Come?

Get a jump start on the year ahead in cybercrime. Join security expert and CEO at KnowBe4, Stu Sjouwerman, for this 30-minute webinar "Phishing and Social Engineering in 2018: Is the Worst Yet to Come?". Stu will discuss some of the latest trends in cybercrime and give you an insider's perspective on what to expect for 2018 and how to prepare for it.

video/webcast | Presented by KnowBe4

Are You Protected Against the Weakest Link in Network Security?

The bad guys are just one gullible user click away from staging an all-out invasion. Watch this 2-minute video and learn how you can keep your users on their toes with security top of mind.

white paper | Presented by KnowBe4

Best Practices for Dealing with Phishing and Next-Gen Malware

Phishing and malware threats are skyrocketing. To combat these attacks, read this new Osterman Research white paper that gives you a list of high-priority actionable items, all related to IT security.

white paper | Presented by KnowBe4

Best Practices for Dealing With Phishing and Ransomware

Phishing and ransomware are serious problems that can steal data or disable access to your organization's network. Both ransomware and phishing are increasingly common and are having devastating impacts on businesses of all sizes. The FBI estimates that ransomware alone cost organizations $209 million in just the first three months of 2016!

white paper | Presented by KnowBe4

CEO Fraud Prevention Manual

CEO fraud is responsible for over $3 billion in losses. Don't be next. The CEO Fraud Prevention Manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.

white paper | Presented by KnowBe4

Endpoint Protection Ransomware Effectiveness Report

It's estimated that in 2016, the cost of ransomware was over $1 Billion, making it the most lucrative criminal business model in the history of malware. In this report we examined who is at risk, what the scope and cost of an attack is, how organizations are protecting themselves from ransomware, and the effectiveness of their endpoint protection. Find out what is really the best way to combat the threat of ransomware.

white paper | Presented by KnowBe4

Security Awareness Training: Are We Getting Better at Organizational and Internet Security?

Attackers are constantly honing their skills and adapting their attack methods, and your employees remain the weak link in your network security.

Load More