Skip Links

Network World

Resource Library

  • Building Higher IT Business Continuity in the Face of Disaster
    Source: Dell Software
    White Paper: Discover the necessary steps you should be taking to upgrade your disaster preparedness and to prevent your business from coming to a grinding halt. Read this paper and learn how to prevent forces of nature, malicious acts or simple mistakes from having a lasting negative effect on your business.
  • Choosing the Right Deduplication Solution
    Source: Dell Software
    White Paper: Nearly every backup-and-recovery solution on the market today includes deduplication and compression capabilities. Read this paper and learn how to weigh the advantages of appliance-based vs. software-based deduplication, and find the right fit for your organization.
  • Be a C-Suite Hero With These 5 Key Virtual & Physical Data Protection Takeaways
    Source: Dell Software
    White Paper: Redefine your business goals and drivers for data protection, and think like a CIO when you apply the five key takeaways in this eBook. Discover alternative approaches to protect your hybrid, virtual and physical environments, and embrace new solutions to secure your data assets.
  • Solving Data Growth Issues using Deduplication
    Source: Dell Software
    White Paper: Learn the basic principles of deduplication and the beneficial role it plays within a corporate environment. Read this paper and discover how you can back up systems within the required maintenance windows while keeping storage costs low through deduplication and replication.
  • Superior VMware® Protection for Limited IT Budgets
    Source: Dell Software
    White Paper: A complete VMware data-protection strategy should offer protection for mission-critical applications, along with automated nightly backup and replication for less critical data. Find out the four major criteria for implementing cost-effective data protection in your own VMware environment. Read the White Paper.
  • The Next Generation Threat Protection Challenge
    Source: Cisco, Damballa, Fortinet, HP
    White Paper: More sophisticated hackers are causing major headaches for enterprises. They have developed advanced techniques to get by the perimeter defense and slowly unfold their attacks deep within the enterprise. CSOs need to respond and put in defenses so they don't end up being the new victims creating negative headlines.

    The question is, "What is required to stop the hackers?" The Challenge hosts a lively debate on the role of vendor research, sandboxing and what the next generation of threat protection solutions must incorporate to be effective. The discussion will help you understand what is required from a top-notch solution to stop the hackers and answer the question: "Which next generation advanced threat protection solution is right for my enterprise?"

    I have assembled four leading security vendors to shed light on the issues and solutions. Cisco, Damballa, Fortinet and HP help you understand the challenges you face. Attend this "conference session on paper" and learn the views of group experts on meeting the challenges of protecting your enterprise.
  • Best Practices for Dealing with Phishing and Next-Gen Malware
    Source: KnowBe4
    White Paper: Phishing and malware threats are skyrocketing. To combat these attacks, read this new Osterman Research white paper that gives you a list of high-priority actionable items, all related to IT security.
  • What You Need to Know About Ransomware
    Source: KnowBe4
    White Paper: Get the most informative and complete Ransomware Hostage Rescue Manual. This manual is packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware. You will also receive a Ransomware Attack Response Checklist and Ransomware Prevention Checklist.
  • Your Money or Your Files - A Short History Of Ransomware
    Source: KnowBe4
    White Paper: "The year 2014 may well go down in the history books as the year that extortion attacks went mainstream." -Brian Krebs, security journalist.

    In this whitepaper you will learn about the skyrocketing ransomware infection rates, its history, ransomware families, cryptolocker and copycats, ransomware infection vectors and effective mitigation strategies.
  • Creating and Testing your IT Recovery Plan
    Source: Quorum
    White Paper: Testing at least once per month is important to maintain engineering best practices, to comply with stringent standards for data protection and recovery, and to gain confidence and peace of mind. In the midst of disaster is not the time to determine the flaws in your backup and recovery system. Backup alone is useless without the ability to efficiently recover, and technologists know all too well that the only path from "ought to work" to "known to work" is through testing.
  • The Cost of Downtime: Top 5 Must Know Facts When Considering a Backup, Recovery, and Continuity Investment
    Source: Quorum
    White Paper: This publication is for small to mid-size business owners and financial/operational decision makers responsible for overall corporate welfare. If your reputation or revenue will suffer from a business failure, this is for you.
  • WAN Virtualization with Citrix CloudBridge
    Source: Citrix Systems
    White Paper: Today, enterprises rely on wide area networks (WANs) to support an ever-growing number of bandwidth-intensive business critical applications. Since these applications are used to "run the business," they demand high reliability and quality of service. This white paper provides a detailed overview of WAN virtualization and discusses some of the unique features that the CloudBridge Virtual WAN solution provides.
  • Hybrid Will Be the New Normal for Next Generation Enterprise WAN
    Source: Citrix Systems
    White Paper: Public cloud services, SaaS, and mobility are driving enterprises to rethink how they architect their WANs. Gone are the days when all applications resided in regional data centers and branches only needed a single MPLS connection. Today, applications reside off the corporate network and users connect from wherever they choose to work. This change calls for a new approach for optimizing the corporate WAN and Citrix is at the forefront of this evolution.
  • The Agile Enterprise: Business Mobility Enabled by Hyper-Converged Infrastructure
    Source: Dell | F5
    White Paper: The need to achieve agility in the face of tight budgets and an IT employee skills gap is a challenge that organizations must confront. Deploying VMware Horizon on the pre-configured and pre-validated F5 BIG-IP and EVO:RAIL solution addresses these critical issues, enabling enterprises of all kinds to attain a high level of agility through business mobility.
  • The Cost of Data Breach: Healthcare Settlements
    Source: Absolute Software Corporation
    White Paper: IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations. Download this whitepaper to read about some of the most costly data breaches that resulted from lost or stolen devices.

Results 1 - 15 of 537