Skip Links

Network World

Resource Library

  • Enterprise Collaboration Shouldn't Be a Pile of Legos
    Source: Jive Software
    White Paper: Remember getting your first box of LEGOS as a kid? How fun it was putting the pieces together, collaborating with your friends to create something new? Now, as an IT professional, assembling and maintaining a Lego-like collaboration infrastructure isn't what you signed up for. Piecing together disparate systems of record for email, web meetings and other applications is about as painful as stepping on a pile of Legos. Download this paper to learn how implementing a collaboration hub connects systems of record the easy way.
  • IDC MarketScape: Worldwide Enterprise Social Networks 2014 Vendor Assessment
    Source: Jive Software
    White Paper: Enabling a "digital business" is becoming an increasing priority for organizations; the transition to enabling a digital interaction model inside an organization is twofold. There are technologies that underpin interactions as well as the cultural and behavioral changes that support this transition. Enterprise social networks (ESNs), and more broadly, social workflow, can play a significant role in this particularly when thought of as both a platform and a social workflow embedded in business systems where users are getting work done. This study identifies several key areas of market opportunity that lead to criteria by which vendors can be judged now and over the next three to five years.
  • 10 Commandments of Collaboration for Exceptional Customer Service
    Source: Jive Software
    White Paper: For organizations where customer experience is key, customer collaboration is one of the best ways to build trusted relationships and improve customer loyalty. Read this whitepaper to discover best practices that drive brand affinity, repeat business and increased loyalty - all while decreasing your overall customer service cost.
  • Gartner Magic Quadrant: Magic Quadrant for Social Software in the Workplace
    Source: Jive Software
    White Paper: With its in-depth guidance and independent third-party vendor evaluations, Gartner's Magic Quadrant market assessment can assist your organization in implementing an effective communication and collaboration solution. The full report covers 17 vendors, with specific information on their ability to execute and completeness of vision.
  • Virtualize Your SAP Environment: A Joint Solution Offering from SAP & VMware to Increase IT Agility & Minimize Virtualization Risk
    Source: VMware | EMC
    White Paper: If yours is like most IT organizations today, you're under constant pressure to do more with less - even as demand for your services continues to increase. You're expected to drive down costs and operate at peak efficiency. SAP and VMware have joined forces to offer you a proven solution that has already helped SAP customers all over the world transform the way they manage their SAP landscapes.
  • Dell Engineered Solutions for VMware EVO: RAIL
    Source: Dell Inc.
    White Paper: As the first 100% VMware-powered hyper-converged infrastructure appliance, the Dell Engineered Solutions for VMware EVO: RAIL is a pre-configured, fully integrated, hyper-converged appliance designed to help you deploy applications faster, scale up and down easier, and better manage infrastructure and workload delivery.
  • Web Security: Protecting The Heart Of Your Business
    Source: Akamai
    White Paper: Much like your home needs electricity or water to make it habitable, companies require the Internet for most of their business-critical functions. The business risks of not being able to connect with customers over the Internet or recovering from a data breach are significant. Download this Forrester whitepaper to learn how you can grow your business through a reliable and secure internet presence.
  • The Importance of Improving and Adapting Web Security
    Source: Akamai
    White Paper: With so much depending on web site availability, Chief Security Officers are considering new ways to be cost-effectively proactive and vigilant. This paper looks at the challenges and options to web security deployment.
  • Improving DDoS Protection
    Source: Akamai
    White Paper: A recent survey reveals a significant disconnect between companies' concerns and their preparedness when it comes to potential DDoS attacks. This survey looks at the high level of concern about the impacts of DDoS attacks and the "always-on" solution to help identify and mitigate attacks.
  • Gatepoint Research: Beyond the Firewall: Protection and Performance
    Source: Akamai
    White Paper: Threats to web and network resources are increasingly sophisticated and costly. Potential sources of threats have dramatically increased as cybercrime has evolved into big business. This white paper will look at escalating attack concerns, how to address the challenges as well as looking at building a cloud-based defense strategy.
  • Cisco 2014 Midyear Security Report: Identifying Weak Links
    Source: Cisco Systems
    White Paper: Adversaries spend 100 percent of their time finding weak links and using them to their advantage. And as the Internet of Things accelerates and our dependence on the connected environment continues to expand, so do opportunities for attackers.

    Download the Cisco 2014 Midyear Security Report to learn about the different types of vulnerabilities that exist in the systems we rely upon, including the Internet itself, and what can be done to reduce their number and impact.

    This report explains:
    - The significant drop in the number of exploit kits since February
    - The challenges with catching Java
    - Industry risks across verticals

    Understand the tactics so you can thwart these industrious adversaries.
  • Next Generation Firewall Security Value Map
    Source: Cisco Systems
    White Paper: Cisco ASA with FirePOWER Services is the industry's first threat-focused next-generation firewall (NGFW). According to a recent NSS Labs test, Cisco ASA with FirePOWER Services achieved 99.2 percent security effectiveness, the highest score among all tested NGFW products.

    Announced earlier this month, Cisco ASA with FirePOWER Services surpasses legacy NGFW offerings with unprecedented multi-layered protection for integrated threat defense.

    This threat-focused approach was previously available only on FirePOWER appliances. It is now available across the entire Cisco ASA product line for companies of all sizes. Customers can be confident that they will receive the best protections possible, regardless of deployment mode.
    The NSS Labs NGFW reports provide the details on how Cisco models achieved:
    - Consistent, industry-leading security effectiveness
    - Strong resistance to evasion
    - High performance above published throughput
    - Competitive total cost of ownership
  • Cisco 2014 Midyear Security Report: Identifying Weak Links
    Source: Cisco Systems
    White Paper: As the Internet of Things accelerates, adversaries will spend even more time finding weak links across the threat landscape and using them to their advantage to compromise systems and data. Download the Cisco 2014 Midyear Security Report to learn about these threats as well as industry-specific risks.
  • Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
    Source: Cisco Systems
    White Paper: Today's threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It's time for a new security model that addresses the full attack continuum - before, during, and after an attack.
  • String of Paerls Infographic
    Source: Cisco Systems
    White Paper: Analysis was conducted on 45 days' worth of samples and clustered together based on a matching set of alert criteria. This process reduced more than 1 million detailed sample reports to just over 15 thousand sample clusters that exhibit similar behavior.

Results 1 - 15 of 553