Skip Links

Network World

Resource Library

  • Private Cloud for the Mid-Sized Enterprise
    Source: ZeroStack
    White Paper: This white paper dives deep into the complexities of building highly agile and secure private clouds in enterprises with limited personnel and budget resources, and takes a vendor-neutral look at how to make private cloud projects successful.
  • The Blind State of Rising SSL/ TLS Traffic: Are Your Cyber Threats Visible?
    Source: F5 Networks
    White Paper: Security solutions designed to monitor network traffic to detect threats and prevent data leakage are becoming less effective as a result of the growing volume of bandwidth associated with cloud-based services and the rising amount of encrypted traffic, according to the results of an IDC survey commissioned on behalf of F5 Networks. This white paper provides an overview of SSL/TLS as well as its current status in enterprise adoption and its impact on the enterprise IT. The document also discusses security issues and challenges associated with failing to inspect SSL/TLS traffic.
  • Enabling Digital Business Through Enterprise Scale Agility
    Source: Unisys
    Webcast: Agility is a hallmark of the Digital Business. It supports faster competitive responses, product introductions and improvements, and makes for shorter cycle times across business processes. However, one of the most important aspects of agility is the ability to "scale" across the entire organization for more widespread benefit. Achieving such scale may seem fairly straightforward, but it actually requires laser-sharp focus and proven processes. In this webcast, we explore it all - from governance requirements and architectural integrity to distributed development and coordination among different teams.
  • How Identity Management Can Accelerate Digital Transformation
    Source: Okta
    White Paper: A hidden key to your digital transformation success: assuring simple and secure access to mission critical applications - any device, anywhere. In this research report from IDG, see how your peers see their role in going digital, and why 75% of them say identity management is crucial to enabling digital business. The report covers:
    - Areas of prioritization
    - Progress levels
    - IAM challenges
    - IaaS deployment
  • Security Innovations in the Cloud
    Source: Amazon Web Services
    Webcast: Wednesday, October 19, 2016 1:00:00 PM EDT - 2:00:00 PM EDT
    In dynamic cloud environments, many organizations have a need to implement a unified threat management solution that enhances visibility across their workloads. Learn how REAN Cloud adopted Sophos Unified Threat Management (UTM) for increased simplicity, visibility, and security of their AWS workloads. Sophos is an Advanced Technology Partner in the AWS Partner Network that provides a reliable, unified security solution capable of scaling to meet the agility and speed of the AWS Cloud. Join the upcoming webinar to hear Ben Butler from REAN Cloud, Bill Prout from Sophos, and Nick Matthews from AWS discuss security innovations on the AWS Cloud.

    Join us to learn:
    *Why Sophos end user REAN Cloud trusts Sophos UTM for simplicity, visibility and security.
    *How easy it can be to protect your AWS workloads, with a proven and scalable solution designed for the AWS Cloud.
    *AWS security innovations, including support across multiple Availability Zones and UTM Auto Scaling.
  • Critical Steps and Best Practices for Making DDoS Mitigation Part of Your Incident Response Plan
    Source: Akamai Technologies
    White Paper: When a DDoS attack cripples or brings down a site or other application, knowing whom to call first and how to marshal the required resources for mitigation can make the difference between organization-wide panic and a calm, orderly response. Read this paper to learn best practices for making DDoS Mitigation part of your incident response plan.
  • Case Study: 362 Gbps DDoS Attack
    Source: Akamai Technologies
    White Paper: On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
  • Case Study: xss Exploitation through Remote Resource Injection
    Source: Akamai Technologies
    White Paper: Akamai's Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
  • Compare Approaches for Web, DNS, and Infrastructure Security
    Source: Akamai Technologies
    White Paper: How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale-you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
  • The Security Champion's Guide to Web Application Security
    Source: Akamai Technologies
    eBook: Read this guide to learn the key security capabilities that a web application firewall (WAF) can deliver to defend your web applications and to get ideas for extending your existing WAF and improving web application security.
  • Infographic: Is Your Site or App Vulnerable to Attackers?
    Source: Akamai Technologies
    Research/Infographic: This infographic will walk you through a few key questions around your web applications.
  • Bot Management Across Your Business
    Source: Akamai Technologies
    Webcast: Before you can apply a bot management solution, you have to understand the security and performance problems they cause in different areas of your organization. This video explains the crucial first step to bot management: discovering the differing solution requirements of the varied stakeholders affected by bot traffic.
  • Akamai Cloud Security Solutions
    Source: Akamai Technologies
    White Paper: Akamai makes online business fast, reliable and secure. We earned our global reputation by building the world's fastest and largest cloud-enabled delivery platform, which is backed by the most scalable, distributed security solution available. Learn about the security solutions that help protect companies in every industry be secure online.
  • Manage, Don't Mitigate: What You Need to Know About Bots and Scrapers
    Source: Akamai Technologies
    White Paper: In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
  • Real-time Visibility at Scale
    Source: Amazon Web Services
    Webcast: Legacy monitoring and troubleshooting tools can limit visibility and control over your infrastructure and applications. Organizations must find monitoring and troubleshooting tools that can scale with the volume, variety and velocity of data generated by today's complex applications in order to keep pace with business demands. Our upcoming webinar will discuss how Sumo Logic helped Scripps Networks harness cloud-native machine data analytics to improve application quality and reliability on AWS. Sumo Logic allows IT operations teams to visualize and monitor workloads in real-time, identify issues and expedite root-cause analysis across the AWS environment.

    Join us to learn:
    *How to migrate from traditional on-premises data centers to AWS with confidence
    *How to improve the monitoring and troubleshooting of modern applications
    *How Scripps Networks, a leading content developer, used Sumo Logic to optimize their transition to AWS

Results 1 - 15 of 1004