Filter the library by ...

white paper | Presented by Bitsight

How Automating Third-Party Risk Management Helps Banks and Financial Institutions Address New Regulatory Requirements

Banks & financial firms have long been aware of the need to manage risk in third-party partners & most have a formal program for managing that risk. Yet an existing thirdparty risk management (3PRM) program may not address today's increased levels of outsourcing & new regulatory requirements for cybersecurity. Together, these factors are prompting financial institutions to take a fresh look at the strengths & focus of their 3PRM strategy.

white paper | Presented by Bitsight

Take Control of Vendor Risk Management Through Continuous Monitoring

A study conducted by Forrester Consulting on behalf of BitSight shows why many firms may have a false sense of security with it comes to third-party cyber risk. See key findings and access your free copy here.

white paper | Presented by Neo4j

The Top 5 Use Cases of Graph Databases

Graph databases enable you to generate competitive insights and derive significant business value from your connected data. Discover the top five most impactful and profitable use cases of graph databases, including fraud detection, real-time recommendations, and master data management.

Close the Password Security Gap

Based on data from a global research study from Ovum, this report reveals a lack of control over password security that results in IT relying on employees to manage their passwords and online security, rather than implement and automate with technology.

Finding a Password Manager for Your Business

Choosing the right password solution for your business means defining your unique needs, and finding the product that best delivers on those needs. To help, we've crafted a comprehensive guide to walk you through evaluating and comparing password solutions.

The LastPass Password Expose

In our new report, we've analyzed aggregated data from real businesses using LastPass to bring you the truth about passwords. The verdict: the standard approach to password security in the workplace has failed, and businesses aren't responding to that failure quickly enough.

white paper | Presented by Neo4j

Fraud Detection: Discovering Connections with a Graph Database

Tens of billions of dollars are lost every year by U.S. banks due to fraud. Graph databases can help you stop advanced fraud scenarios in real time by giving you insights based on data connections.

Masiello Group Case Study

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center Solutions, UCaaS and Managed Network Security to optimize communications and collaboration.

UCaaS Solutions Brochure

Unified Communications as a Service (UCaaS) from Windstream is a robust, sophisticated solution on a single unified platform hosted in an enterprise-class data center and accessible through the cloud.

ebook | Presented by Citrix Systems Inc

The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery

Today, new application architectures like Devops microservices are opening great opportunities for innovation. But you still have traditional IT-managed applications to provide for. How do you bridge the gap between these different architectures?

Load More