Skip Links

Network World

Resource Library

  • Forrester: How To Become A Superstar Security Leader
    Source: Google
    White Paper: As an IT leader your fellow executives trust you to protect, support, and drive business performance. However, expectations of IT security have changed with the increase of digital data. Download this Forrester report to read specific examples of how today's top information security professionals are rising to the occasion.
  • Security at Scale with Cloud Computing - A Minute in the Life of Google
    Source: Google
    eBook: No one in today's highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google.
    Google operates seven services with more than one billion active users each. We see every type of attack, bad software, and bad actors - multiple times a day - and we're proud of what our people, processes, and technology do to stop them.
    This report outlines how Google built and evolved defenses so you can apply the same architectural decisions to your enterprise.
  • InRule + Forrester Research: The New Era of Digital Decisioning
    Source: InRule
    White Paper: New research from Forrester reveals how enterprises currently use software to inform and automate operational decisions - and how they plan to handle the ever-increasing amount of decisions to be managed in the future to keep pace with customer demands.

    The study, entitled Step Into the New Era of Digital Decisioning Platforms, uncovered that enterprise IT leaders feel overwhelmed when it comes to keeping pace with the use of existing and emerging decisioning technologies, such as statistical analysis tools, business rules, machine learning and real-time event processing, to satisfy customer expectations.

    Forrester's research indicates that we are on the cusp of a new era of decisioning technologies. These technology innovations are being driven by customers' demand for firms to understand them in the moment and address them in context. Forrester's findings emphasize that to meet customers' growing and evolving demands, firms must automate more of their business decisions, even as the complexity of decisions grows.
    Forrester's research revealed that:

    • Only one-third of organizations surveyed are using Machine Learning and Deep Learning for operational decision making
    • Most organizations need help understanding their technology options with regard to decisioning applications
  • 7 Questions to Ask Before Your Next Digital Transformation
    Source: Google
    White Paper: The way we do business is changing. With new technologies available to improve customer experience, management, security and more, there's few organizations that haven't started the process of digitizing their business for a competitive edge. Find out the key questions CIOS are asking as they consider their next digital investment.
  • IDC: Jumpstarting Your Company's Digital Transformation
    Source: Google
    White Paper: Digital transformation is an important evolution of how smart companies run their businesses, how they interact with their customers, and how they drive ongoing value. This IDC white paper explores the importance of embracing cloud computing as part of DX, and offers CIOs a plan for driving transformation so they emerge as important leaders.
  • Building Scalable Multi-Tenant Cloud Data Centers with Controller-less Overlays
    Source: Mellanox Technologies | Cumulus Networks
    Webcast: If you're involved in data center networking, you know that overlay networking has been available for a while. However, building a scalable, multi-tenant cloud data center overlay networks using whitebox switches has been more of a mystery. Until now.

    Watch our webinar to learn how to build scalable, multi-tenant cloud data centers using controller-less overlays. We'll start with an overview of the top challenges of cloud data center networking, the benefits of using VXLANs as opposed to VLANs for automated self-service networks and a comparison of controller-based versus controller-less overlays. To finish, we'll dive into Ethernet Virtual Private Network (EVPN), a feature offered by Cumulus Networks that provides a scalable, interoperable end-to-end control plane for VXLAN tunnels and a few examples of real-life customer deployments of EVPN with VXLAN.
  • Unlock the 7 Key Steps to a Successful Cloud Migration
    Source: NTT Communications
    Webcast: Date: Thursday, March 29, 2018, 01:00 PM EDT

    If you're like most enterprises, you've already dipped your toe into the cloud. Those who have moved some of their applications and infrastructure to the cloud far outnumber both the early adopters who went "all-in" and those who are still hesitating on the sideline. In a similar way, cloud migrations don't have to be all-or-nothing. In fact, they very rarely are. This interactive webcast will explore what it takes to handle a seamless cloud migration.

    Join this free webinar, presented by IDG and NTT Communications, to learn:
    • The steps that need to be considered for a successful cloud migration
    • How to account for hybrid cloud in your cloud migration planning
    • What roadblocks stop Fortune 500 companies from moving to the cloud
    • Why Fortune 500 clients are moving to the cloud
    • And more
  • Zero-Day Malware Protection for the Enterprise Network
    Source: Radware
    Data Sheet: Every day is zero-day when it comes to malware. Nearly 50% of malware targeting enterprises are zero-day exploits that are not recognized by existing signature-based defenses. With malware being used in the majority of data breaches, organizations are increasingly exposed to the risk of information theft and financial loss.

    Radware Cloud Malware Protection Service defends against zero-day malware by analyzing Internet communication data collected from a global community of 2 million users, using patented machine-learning algorithms, as well as unique sandboxing technology examining over 100,000 malware samples a day, to detect previously unknown alware based on their unique communication behavior patterns.
  • 2017s 5 Most Dangerous DDoS Attacks & Steps to Mitigate Them
    Source: Radware
    White Paper: Enter the digital age, where lines of code and terabytes of information determine who has the tactical advantage. Of late, the pendulum has swung in favor of cyber-attacks. Rate-based technologies, once considered adequate to handle the most advanced distributed denial-ofservice (DDoS) threats, have fallen obsolete as tech-savvy adversaries move beyond the static concepts of most conservative corporate budgets and know how to overcome name-brand mitigation technologies. These ultra-adaptive hackers have given rise to the top five nastiest attack techniques in 2017.
  • Top ERP Systems - Definitive Pricing Guide 2018
    Source: SelectHub
    Trial Download: Zero in on the best ERP systems for your company. This guide provides:

    • The cost structures for cloud or on-premise implementations
    • Costs for users and inclusion of key modules such as CRM, HR, Project Management, Purchasing, Analytics, etc.
    • The costs for customization, data migration, building dashboards and other services
    • The type of training that is offered, and what included free
    • Costs for support, maintenance, upgrades and renewal
    • Key limitations for each of the top solutions that might affect your decision
    • Expert recommendations and personalized pricing based on your specific needs

    SelectHub is a cloud-based platform for Technology Selection Management (TSM). A "best practice" workflow guides you through the entire software selection process-from requirements gathering to product evaluations and RFI/RFPs - to final vendor selection.

    Want help with your shortlist? Connect with SelectHub to expedite your ERP software search with free recommendations based on our expert software evaluations and feedback from actual buyers.
  • Brilliant User Experience Designed for the Digital Workplace
    Source: Nutanix | Citrix
    Research/Infographic: Together, Nutanix Enterprise Cloud, Citrix cloud and NVIDIA offer a simple blueprint to deliver the digital workspace to you. This hybrid cloud solution enables the delivery of graphics-accelerated virtual applications and desktop to every user and every device.
  • Nutanix InstantOn for Citrix Cloud
    Source: Nutanix | Citrix
    White Paper: Given the speed at which the modern workplace is changing, IT organizations are increasingly challenged to keep pace with new digital workplace requirements. Growing businesses, especially those with smaller IT teams and lower budgets, struggle with implementing new solutions and delivering enterprise-level services. Further, legacy IT infrastructure, composed of separate silos of compute, storage, networking and virtualization resources, creates IT complexity, increases costs, reduces business speed and elevates risk.

    To address these challenges, Nutanix and Citrix have partnered to create Nutanix InstantOn for Citrix Cloud, a tightly integrated hybrid cloud solution that simplifies and accelerates virtual application and desktop (VDI) deployments for companies of any size. For businesses that are new to VDI or app virtualization, Citrix and Nutanix can deliver better end-user performance without all the infrastructure complexity. This combined with a low, subscription-based software licensing model enables businesses to grow their app and desktop virtualization footprint without upfront CapEx.
  • A Secure Way to a Digital Future
    Source: Connection
    White Paper: By 2020, 60% of enterprises will be implementing a full-scale digital strategy. The problem is today, 60% of enterprises are at a "digital impasse." Download this Tech Dossier from Connection to learn how Microsoft 365 can break that logjam and help you accelerate toward your organization's digital future.
  • Special Report: Decision Automation
    Source: ServiceNow Inc
    White Paper: Artificial intelligence and machine learning can yield game-changing solutions for enterprises. Here's what senior IT leaders need to know to launch and maintain a successful machine learning strategy.
  • Viavi Solutions Observer GigaStor 288T
    Source: Viavi
    White Paper: Rapid increase in network traffic volumes (including the move to 40Gbe), security threats, and application complexity all underscore the importance for lossless data capture, analysis, and storage to provide crucial raw data for post event analyst and remediation. Critical functions like network security forensics and service troubleshooting need to have 100 percent of the network data available if they are expected to be 100 perfect effective in their jobs.

Results 1 - 15 of 353