Skip Links

Network World

Resource Library

  • Challenging Some of the Myths about Static Code Analysis
    Source: Rogue Wave Software
    White Paper: Static code analysis (SCA) has many benefits, but there are some misconceptions, from a belief that SCA tools are glorified compilers to tools intended only for junior developers. This paper dispels the common myths surrounding SCA and highlights the many benefits of faster project execution, better source code at check-in, less costly development cycles and shorter time-to-market.
  • Top Automotive Security Vulnerabilities
    Source: Rogue Wave Software
    White Paper: Building connected automotive software that's both bulletproof and secure is a big task. Nearly 90 percent of all detected security holes can be traced back to just 10 types of vulnerabilities. This paper explores the issues affecting different types of embedded systems. Using examples from actual source code, it looks at what changes can be made to coding style and processes to avoid these common risks.
  • Static Code Analysis in an Agile World
    Source: Rogue Wave Software
    White Paper: Enhance Agile development processes and empower Agile teams. Learn how the use of automated static code analysis technology enables development teams to locate and describe software source code weaknesses and establish a repeatable process to achieve working software with each iteration before code is delivered to the integration build or testing team.
  • Defend Against Injection-Based Attacks
    Source: Rogue Wave Software
    White Paper: Ensuring software code is resistant to malicious attacks has become a key software development priority. This paper explores some of the most common injection vulnerabilities plaguing the software development industry and presents different ways in which Static Code Analysis tools can help you identify, understand and remove these types of issues from an existing code base, as well as from new code, while you're writing it.
  • Open Source Support Report
    Source: Rogue Wave Software
    White Paper: Despite the reach and dominance of open source software (OSS), there is surprisingly little information on how to effectively support it. This report presents real-world data to explain how open source support insulates organizations from licensing, configuration, and production risks. Discover how you can best prepare to handle OSS by staying abreast of all your OSS packages with the proper support, governance and management.
  • CloudFlare Advanced DDoS Protection
    Source: CloudFlare
    White Paper: Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks-attacks that simply cannot be addressed by traditional on-premise solutions.
    In this whitepaper, you'll learn the anatomy of each attack method and how to protect your web presence from attacks, such as Layer 3 and 4, DNS amplification, SMURF, ACK, and Layer 7.
  • Reduce Your Open Source Security Risk
    Source: Rogue Wave Software
    White Paper: The vulnerabilities and security issues that open source software can introduce into development projects make open source security a top priority. Read on to learn the strategies and tactics required to make it easy to acquire, distribute, use, monitor, analyze, and keep track of open source software to reduce risks and keep vulnerabilities of buggy software and applications to an absolute minimum.
  • Four Strategies to Reduce Your Open Source Risk
    Source: Rogue Wave Software
    White Paper: Open source plays a dominant role in the success of software development teams. Yet few organizations are aware of the risks inherent in the software choices they're making. The four strategies outlined in this white paper will help you understand the importance of establishing an open source management policy so that you can maximize the value of open source software while reducing both technical and legal risks.
  • Fitting Static Code Analysis into Continuous Integration
    Source: Rogue Wave Software
    White Paper: Continuous Integration (CI), a software development practice where new code is frequently integrated and tested, has become a key component of successful DevOps practices. The benefits of CI are clear - the earlier a bug is identified, the easier and faster it is to fix. This white paper details how to maximize the benefits of CI to detect as many issues as possible in each integration build while avoiding manual testing.
  • Application Performance Optimization: Tackling the Challenges of a Remote and Mobile Workforce
    Source: Riverbed Technology
    White Paper: More than half of today's enterprise workforce transitions between the office and working remotely. Supporting this increasingly remote and mobile workforce puts significant pressure on IT teams to deliver seamless connectivity and superior application performance to any location. Learn how you can boost productivity and improve both employee and customer experiences by improving application performance to the edge of the enterprise in this white paper.
  • Pivot3 - Delivering Quality of Service with VMware vSphere 6 and Virtual Volumes
    Source: Pivot3 Inc
    White Paper: Pivot3 recently acquired NexGen. And here's why. With data growing at an increasing rate, organizations are looking for ways to consolidate their IT infrastructures. Virtualization technology has helped to accelerate that consolidation, but new challenges related to provisioning, management, and support have presented themselves.

    NexGen Storage is leveraging its purpose-built software architecture to simplify the operational model through QoS and policy-based management. With QoS, organizations can better align business priorities and SLAs to their business. If you are looking to dynamically manage application performance based on policy-based QoS that better align customer expectations with application performance SLAs, ESG Lab suggests taking a look at Pivot3's flash arrays from NexGen.
  • The Foundation for Cloud-first, Mobile-first IT
    Source: Okta
    White Paper: Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it's accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authentication policies all follow from a well-tuned user lifecycle and access governance foundation.
  • A New World Order for IT
    Source: Okta
    White Paper: With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners - and even intelligent objects like connected cars and monitoring systems - and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring.
    IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
  • Businesses @ Work, March 2016
    Source: Okta
    White Paper: Have you ever wondered which enterprise cloud apps are most popular? Or which industries tend to use Office 365 versus Google Apps? Did you know that 43% of Okta customers have enabled deprovisioning? From where we sit, Okta has a unique view into the adoption and utilization of cloud apps in the enterprise. Our Businesses @ Work report takes an in-depth look into how organizations and people work today, and the apps and services they use to be productive.
  • Top 5 Reasons to Automate Identity Lifecycle
    Source: Okta
    White Paper: Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive.

    When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace.

    This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.

Results 1 - 15 of 692