Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Analyst Report | Presented by Onapsis

Defend your Business-Critical SAP Applications from Active Threats

Onapsis & SAP just released a new threat intelligence report to help SAP customers protect from active cyber threats seeking to target, identify and compromise organizations running unprotected SAP applications. Key findings of this research report include:

Analyst Report | Presented by Onapsis

Defend your Business-Critical SAP Applications from Active Threats

This joint report developed by Onapsis and SAP highlights active threat activity seeking to specifically target, identify and compromise organizations running unprotected SAP applications, through a variety of cyberattack vectors.

White Paper | Presented by Onapsis

Securing the SAP Landscape Against Cyber Threats

SAP systems and the critical data they contain are being targeted by cybersecurity attacks at an increasing rate. Multiple forces are driving this change. Key findings of this research report include:

White Paper | Presented by Onapsis

Securing the SAP Landscape Against Cyber Threats

SAP systems and the critical data they contain are being targeted by cybersecurity attacks at an increasing rate. Multiple forces are driving this change. First, the data contained within SAP systems has become even more essential to the organization, and therefore more attractive to hackers, due to increased integration between systems, with applications like SAP SuccessFactors and SAP Ariba now connected with financial and ERP systems.

Video/Webcast | Presented by OpenText

Catching and responding to cyber threats in minutes, not days with MDR

Every 11 seconds a business falls prey to a ransomware attack. What’s more, attackers are becoming more sophisticated, often staying hidden within an organization’s environment for months (or even years).

Video/Webcast | Presented by IBM

Protect This Cloud: How IBM Security Guardium Data Protection Helps Secure AWS Environments

Learn more about Guardium's inclusion in the AWS marketplace and how IBM and Amazon are partnering to deliver effective data security to AWS customers.

Augmenting Your Microsoft Office 365 EOP and ATP Email Security Infrastructure

In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of organizations globally now use Microsoft Office 365 (O365). This has supported an agile and fluid way of doing business.

eBook | Presented by Abnormal Security

CISO Guide to Vendor Email Compromise (VEC): The Risks of VEC and How to Stop It

Protect Your Organization. Stop Vendor Email Compromise. Do you know if that email from your vendor is actually from your vendor? Cybercriminals use compromised email accounts to commit invoice, payment and RFQ fraud. Traditional email security platforms can't catch these attacks because they come from real email accounts.

Video/Webcast | Presented by OpenText

Protect your personnel by taking a second look at compliance issues with OpenText document management solutions

Join us to discuss HR compliance trends, challenges, and what to watch for, and how OpenText document management solutions for SAP SuccessFactors can help.

Video/Webcast | Presented by Splunk

The State of Security 2021

Security organizations have always been hard-pressed to keep up with the rising tide of data, the ever-expanding perimeter, and the increasing frequency and sophistication of attacks

Load More
Popular Resources