Skip Links

Network World

Resource Library

  • Enhance Reliability, Scalability, and Performance for Microsoft Sharepoint, Exchange, and Lync
    Source: Riverbed Technology
    White Paper: Microsoft SharePoint, Exchange, and Lync are important enterprise applications that organizations use to boost productivity through document sharing and collaboration, email, and instant messaging. Ensuring that these applications are reliable, scalable, and fast is the goal of a software-based application delivery controller (ADC), such as RiverbedĀ® SteelApp™.
  • Vendor Landscape: Application Delivery Controllers
    Source: Riverbed Technology
    White Paper: Application delivery controllers (ADCs) only vaguely resemble the load balancers they started as. With a wide array of features coming from each vendor, it is important to evaluate the market before choosing a solution. This research will help you understand what's new in the ADC market, evaluate ADC vendors and products for your enterprise needs, and determine which products are most appropriate for particular use cases and scenarios.
  • ROI Benefits from Automating Application Delivery Solutions
    Source: Riverbed Technology
    White Paper: One of the key tenets of a modern data center is the ability to leverage technologies that enable automation in order to accelerate business processes and ultimately time to market. Organizations that continue to deploy legacy infrastructures and ignore this transformation to modern automated environments will soon face a harsh reality: Their legacy IT environments have restricted their ability to compete. Considering the fact that all modern businesses rely on IT to power their operations, IT organizations need to examine all aspects of the IT infrastructure for its ability to be automated and ensure that the deployed technology is an enabler for this transformation and not an inhibitor. The key to making the transformation from a legacy network to a modern infrastructure is adding the enabling technologies or services to create this new automated environment.
  • PCI DSS Compliance in Cloud Environments
    Source: Riverbed Technology
    White Paper: PCI DSS is a pragmatic set of best practices and security measures that any organization must follow if they accept and handle cardholder data online. The PCI Security Standards Council released an information supplement to the PCI DSS requirements to help merchants to understand the challenges involved when deploying payment processing systems in the cloud, and outline what needs to be considered so that they achieve PCI DSS compliance in this environment.
  • Think You've Mastered Application Performance? Think Again
    Source: Riverbed Technology
    White Paper: The landscape of application delivery is shifting. Two big changes are driving the trend, application performance is now on the critical path of business and application architectures are more complex.
  • Application Delivery for Next-Generation Business-Ready Datacenters
    Source: Riverbed Technology
    White Paper: The enterprise datacenter network is evolving to meet the changing needs of a mobile, virtualized environment. Cloud computing and the increased consumerization of IT are also driving the creation of a new datacenter environment that depends heavily on application delivery to meet the needs of business users, partners, and consumers. This Technology Spotlight describes the evolving requirements for IT to meet end-user performance expectations and the need for application delivery. In addition, this paper discusses benefits and challenges associated with application delivery solutions and trends driving growth. Finally, the paper looks at the role of Riverbed Technology as it plays a part in innovating in this strategically important market.
  • Agari's Email TrustIndex Report: Protecting Customers and Safeguarding Brand Reputation in the Era of the Cybercriminal
    Source: Agari
    White Paper: Agari's Quarterly TrustIndex offers a unique scorecard to see how well both individual companies (133 companies) and entire industries (11 industries) have protected their customers from email cyberthreats. Because Agari gathers this data every quarter, we have patterned the trend lines to learn who is doing better and who is falling behind. See where your industry stacks up!
  • How JPMorgan Chase Adopted DMARC to Stop Cyberattacks and Protect their Brand
    Source: Agari
    White Paper: When Agari customer JPMorgan Chase decided to adopt DMARC to stop phishing attacks and protect their brand, the problem was much bigger than they anticipated. Learn how, with Agari, they implemented DMARC, stopped cyberattacks, and restored their brand reputation.
  • How Big Data Can Stop Brand Abuse and Phishing for Commerce
    Source: Agari
    White Paper: Tools that use big data to analyze from the world's inboxes are providing a new way to prevent cyberattacks and stop brand abuse. Learn how Agari's cloud-based solution can guarantee rejection of phishing messages across the Internet to protect your brand, reduce your liability and enhance your consumer trust.
  • Understanding DMARC for Securing Email Channels
    Source: Agari
    White Paper: DMARC (Domain-based Message Authentication, Reporting and Conformance) is a newly released technical specification that brings long-missing features to email - enabling senders to gain visibility into how their email domains are used and abused. Learn more about how DMARC is combined with existing authentication technologies to create secure email channels, and provide receivers with clear directives on how to safely dispose of unauthorized email - all at Internet scale.
  • Gartner 2014 Magic Quadrant for Application Delivery Controllers
    Source: F5 Networks
    White Paper: F5 Networks is positioned in the Leaders Quadrant for Application Delivery Controllers for the eighth consecutive year. The application delivery controller (ADC) is a key component within enterprise data center and public cloud architectures, and according to Gartner, enterprises should evaluate ADCs based on how they integrate with key applications and cloud/virtualization platforms.
    Access this report now to see how Gartner evaluates vendors based on ability to execute and completeness of vision. You'll learn:
    * Strengths and weaknesses of vendors
    * Vendor placement on the MQ, with descriptions of leaders, challengers, visionaries and niche players
    * Gartner's evaluation criteria for inclusion on the MQ

    *Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
  • How to Monitor Microsoft Lync Performance
    Source: Ipswitch, Inc
    White Paper: This paper discusses problems with Lync performance and availability, and illustrates specifically how a superior application performance monitoring solution integrates with network management tools to give IT the visibility it needs to rapidly resolve Lync issues.
  • ESG Lab Validation: Symantec Backup Exec 2014
    Source: Symantec
    White Paper: Server virtualization has taken IT by storm and many IT organizations now struggle to find the best methods for protecting their physical and virtual servers. For customers looking to address VM data protection, certain best practices can ensure optimal protection and recovery characteristics. Learn how ESG Lab would rate Backup Exec 2014 in terms of these best practices and why Symantec comes out on top.
  • Conquering the Top 5 Enterprise Data Protection Challenges
    Source: Symantec
    White Paper: How are today's CIO's overcoming today's datacenter challenges? Data protection, server consolidation, and disaster recovery coupled with the demand of end users and strict service level agreements (SLA) lead IT organizations to do more with less without losing productivity. Only by having the right data protection solution and tested procedures in place will enterprises be prepared to overcome these challenges. Learn why IT must push for 100% virtualization, simplified disaster recovery systems, and efficient data protection solutions to achieve greater administrative efficiencies and meet these demands.
  • Data Protection: Solve the Complexity with Practical Strategies
    Source: Symantec
    White Paper: It could be argued that data is the lifeblood of any business yet many organizations continue to struggle with keeping their data safe. There are two major factors preventing most businesses from adequately protecting their data: complexity and inefficiency. Learn how the combination of complexity and inefficiency leads to increased risk for the organization and how Symantec can help tackle the often overwhelming task of protecting today's IT environments without increasing complexity, creating silos, or distracting the IT staff from other critical tasks.

Results 1 - 15 of 573