Skip Links

Network World

Resource Library

  • How JPMorgan Chase Adopted DMARC to Stop Cyberattacks and Protect their Brand
    Source: Agari
    White Paper: When Agari customer JPMorgan Chase decided to adopt DMARC to stop phishing attacks and protect their brand, the problem was much bigger than they anticipated. Learn how, with Agari, they implemented DMARC, stopped cyberattacks, and restored their brand reputation.
  • Agari's Email TrustIndex Report: Protecting Customers and Safeguarding Brand Reputation in the Era of the Cybercriminal
    Source: Agari
    White Paper: Agari's Quarterly TrustIndex offers a unique scorecard to see how well both individual companies (133 companies) and entire industries (11 industries) have protected their customers from email cyberthreats. Because Agari gathers this data every quarter, we have patterned the trend lines to learn who is doing better and who is falling behind. See where your industry stacks up!
  • Your Money or Your Files - A Short History Of Ransomware
    Source: KnowBe4
    White Paper: "The year 2014 may well go down in the history books as the year that extortion attacks went mainstream." -Brian Krebs, security journalist.

    In this whitepaper you will learn about the skyrocketing ransomware infection rates, its history, ransomware families, cryptolocker and copycats, ransomware infection vectors and effective mitigation strategies.
  • Your Money or Your Files - A Short History Of Ransomware
    Source: KnowBe4
    White Paper: "The year 2014 may well go down in the history books as the year that extortion attacks went mainstream." -Brian Krebs, security journalist.

    In this whitepaper you will learn about the skyrocketing ransomware infection rates, its history, ransomware families, cryptolocker and copycats, ransomware infection vectors and effective mitigation strategies.
  • Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall
    Source: McAfee
    White Paper: Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
  • Eight Ways to Improve Your Network High Availability
    Source: McAfee
    White Paper: Enterprises worldwide rely on network high availability for business continuity. Find out how the capabilities that are part of your next-generation firewall can help ensure that your network is up and running all day, every day.
  • The Security Industry's Dirty Little Secret - The Debate Over Advanced Evasion Techniques
    Source: McAfee
    White Paper: Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community--where they are well known and have been in widespread use for several years--there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
  • Advanced Evasion Techniques for Dummies
    Source: McAfee
    White Paper: Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here's advice on how to evade AETs.
  • 10 Must-Have Features for Your Next Generation Firewall
    Source: McAfee
    White Paper: The need for extreme protection may be the driving force behind your decision to invest in a next-generation firewall (NGFW), but your enterprise also has other factors to consider. You want an NGFW that ensures business resiliency, a reasonable total cost of ownership (TCO), continuous uptime, scalability, and flexibility to handle change. It must fit your budget and your network's specific needs.
  • Augmented VPN
    Source: McAfee
    White Paper: Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
  • Shadow IT in the Enterprise
    Source: Nasuni
    White Paper: With over 100 million users worldwide, Dropbox is everywhere. The real question is - who in your organization is using Dropbox FOR WORK?

    This report reveals insights from more than 1,000 corporate IT users about their usage of Dropbox and personal mobile devices for work. Read this paper to gain an understanding for where consumer solutions are being used and if IT policies are effective in addressing the challenges associated with Shadow IT.
  • 5 Ways Cloud-integrated Storage Reduces Costs
    Source: Nasuni
    White Paper: Many companies are considering using cloud storage to reduce costs and the IT burden of storing data in the enterprise. However, simply calculating the annual cost of a SAN or NAS server versus the per GB cost of cloud storage does not produce an accurate view of cost savings, because cloud storage alone is not equal to all the functionality found in today's enterprise-class storage solutions. This brief discusses how Cloud-integrated Storage (CiS) delivers the benefits of cloud storage with the features and functionality that enterprises require, while still reducing the cost of storage.
  • Storage Needs in Architecture, Engineering and Construction Environments
    Source: Nasuni
    White Paper: Firms in the architecture, engineering and construction (AEC) verticals face a unique challenge - enabling collaboration amongst projects and teams dispersed across the globe. Adding to the complexity of the situation are the large files created due to programs such as AutoCAD, Revit, and Bentley MicroStation.
  • Bulk Data Migration in the Cloud
    Source: Nasuni
    White Paper: This report looks at the important issue of aggregate I/O performance within and across a selected set of providers to determine how long it would take to move a large amount of data in the cloud. In tests of cloud-to-cloud transfers, Nasuni compared the top three CSPs from its most recent State of Cloud Storage report - Amazon S3, Microsoft Windows Azure and Rackspace - and compared transfer rates among them. Download this white paper to find out how each of the cloud storage providers performed and which came out on top.
  • Your Money or Your Files - A Short History Of Ransomware
    Source: KnowBe4
    White Paper: "The year 2014 may well go down in the history books as the year that extortion attacks went mainstream." -Brian Krebs, security journalist.

    In this whitepaper you will learn about the skyrocketing ransomware infection rates, its history, ransomware families, cryptolocker and copycats, ransomware infection vectors and effective mitigation strategies.

Results 1 - 15 of 422