Skip Links

Network World

Resource Library

  • The Shifting Technology Landscape: Reshaping Career Opportunities
    Source: Randstad Technologies
    White Paper: The current expansion of third platform technologies presents a wealth of job opportunities for IT professionals with skills and ambition in mobile computing, social networking, the cloud and big data analytics.
  • US Government Palo Alto Networks
    Source: CDW
    White Paper: As one of the premier government research and development (R&D) organizations for national security in the world, this organization needed to secure some of the country's most sensitive weapons information. With over 5,000 employees and a relatively small real estate footprint, they were convinced that they could consolidate their multi-vendor approach into a singular next-generation cyber security platform. Given its mission, the importance of the information to be secured could not be underestimated. Palo Alto Networks was a natural fit.
  • Security Orchestration for the Software-defined Data Center: The 4 Critical Success Factors
    Source: CDW
    White Paper: The past several years have seen service providers make massive investments in data centers, acquiring millions of square feet of DC space. In order to maximize the returns on these investments, providers are racing to adopt a "software-defined everything" approach to delivering services. Open solutions such as KVM and OpenStack are favored in these hyperscale environments because of cost and flexibility. However, simply putting a firewall at the perimeter of the SDDC does not meet the security or operational needs. Orchestrated security must be embedded within the SDDC architecture. This solution brief outlines how Palo Alto Networks enables the key requirements for security in these environments.
  • Breaking the Attack Kill Chain
    Source: CDW
    White Paper: Cybercrime is big business. By many estimates, cybercrime is now a US $1 trillion dollar industry. Every organization with digital assets is vulnerable to attack and the growing sophistication of cyber criminals and their evolving tactics only increases the chance of a security breach involving the theft of sensitive data. Effective cyber defense must withstand changes to adversaries' tactics and tools that traditional, non-integrated "best of breed" approaches cannot address. It must also protect against advanced known threats, as well as unknown threats, which can be challenging to address with legacy solutions. The Enterprise Security Platform from Palo Alto Networks is a modern approach to providing new defense and resilience in detecting and preventing attacks at every stage of the Attack Kill Chain.
  • 10 Things Your Cybersecurity Solutions Must Do
    Source: CDW
    White Paper: Cybersecurity requires multiple detection and prevention capabilities to enable teams to manage risk and mitigate attacks. As cybercrime evolves, so must the tools and techniques you use to secure your organization. But, using individual products to solve individual problems isn't the answer. Choosing a holistic cybersecurity solution that can dynamically adapt to the changing threat landscape is vital.
  • 10 Things Your Next Firewall Must Do
    Source: CDW
    White Paper: Users continue to adopt new applications and technologies - and the threats carried by them. In some organizations, obstructing the adoption of new technologies can be a career-limiting move. Even when it isn't, applications are how employees get their jobs done, or maintain productivity in the face of competing personal and professional priorities. Because of this, safe enablement is increasingly the correct policy stance. But to safely enable these applications and technologies, and the business that rides atop them, network security teams need to put in place the appropriate policies governing use, but also controls capable of enforcing them. The ten things described here are critical capabilities for putting the necessary controls in place - especially in the face of a more varied and rich application and threat landscape. Without the network security infrastructure to cope with that variety and depth, security teams cannot safely enable the necessary applications and manage risk for their enterprises.
  • UCC: Are You Listening?
    Source: PGi
    White Paper: Do more with less. That's the mantra for IT, which has fewer and fewer resources to produce more. Unified communications and collaboration tools can alleviate technical obstacles and offer significant strategic IT benefits when you have the right partner in place.
  • 5 Steps For Securing The Data Center: Why Traditional Security May Not Work
    Source: Cisco Systems
    White Paper: Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. Learn more about the 5 steps you need to take to secure your data center today.
  • Cisco 2015 Midyear Security Report
    Source: Cisco Systems
    White Paper: The Cisco 2015 Midyear Security Report examines intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores:
    - Future trends
    - Offers
    - Advice for small, midsize, and enterprise organizations that seek security solutions and services.
  • Next Generation Firewall Security Value Map
    Source: Cisco Systems
    White Paper: Cisco ASA with FirePOWER Services is the industry's first threat-focused next-generation firewall (NGFW). According to a recent NSS Labs test, Cisco ASA with FirePOWER Services achieved 99.2 percent security effectiveness, the highest score among all tested NGFW products.

    Announced earlier this month, Cisco ASA with FirePOWER Services surpasses legacy NGFW offerings with unprecedented multi-layered protection for integrated threat defense.

    This threat-focused approach was previously available only on FirePOWER appliances. It is now available across the entire Cisco ASA product line for companies of all sizes. Customers can be confident that they will receive the best protections possible, regardless of deployment mode.
    The NSS Labs NGFW reports provide the details on how Cisco models achieved:
    - Consistent, industry-leading security effectiveness
    - Strong resistance to evasion
    - High performance above published throughput
    - Competitive total cost of ownership
  • Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
    Source: Cisco Systems
    White Paper: Today's threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It's time for a new security model that addresses the full attack continuum - before, during, and after an attack.
  • Buyer's Criteria for Advanced Malware Protection
    Source: Cisco Systems
    White Paper: Download Buying Criteria for Advanced Malware Protection for an up close look at what it really takes to effectively deal with advanced malware along with recommended guidelines for making advanced malware protection purchase decisions.

    - Learn how to accurately compare advanced malware protection offerings
    - Get a list of key questions to ask anti-malware vendors depending on your needs
    - Identify capabilities to ensure you are selecting products that provide protection along the full attack continuum - before, during and after an attack
    - Understand what you need to protect your extended network that also includes secure gateways, endpoints, mobile devices and virtual systems
  • IBM is a Leader in The Forrester Wave: Enterprise Social Platforms, Q2 2014
    Source: IBM
    White Paper: The Forrester Wave for Enterprise Social Platforms offers in depth vendor evaluation based on 65 criteria to help your organization choose an enterprise social platform. The full report evaluates 13 social software vendors, with specific information on their core functionality and strategy.

    Forrester stated in the report that, IBM Connections is one of the leaders with "a robust core product offering that extends the value through a broader ecosystem."
  • Next Generation Security Buyer's Guide
    Source: Cisco Systems
    White Paper: Considering a next-generation security solution? Utilize this buyer's guide to arm yourself with key criteria you should require of your network security provider to meet today's threat landscape needs.
  • NSS Labs Brief -- Cyber Resilience
    Source: Cisco Systems
    White Paper: It's not about the 98 percent you catch, it's about the 2 percent you miss. Not every attack can be prevented, but with a cyber-resilience program, damage can be mitigated or avoided altogether. Learn more now by reading NSS Labs Analyst Brief - Cyber Resilience.

Results 1 - 15 of 506