Skip Links

Network World

Resource Library

  • Unleash the Power of Video in the Enterprise
    Source: Sonic Foundry
    White Paper: In this whitepaper you'll get a step-by-step guide on how to build a solid video strategy, tips on jumpstarting video use in your organization, a checklist to help you choose the right video solution and a list of metrics you need to track to ensure success.
  • Managing Rapid Data Growth: A Trial By Fire Hose
    Source: Attunity
    White Paper: Is your data growing out of control? The bad news is that you've got your work cut out for you when it comes to capturing and exploiting that data. The good news is that there is a pretty good chance your company is being rewarded for those efforts. This report from Aberdeen Research explores the impact of rapid data growth on today's organizations and seeks to understand how companies are responding to the challenge.
  • Your Money or Your Files - A Short History Of Ransomware
    Source: KnowBe4
    White Paper: "The year 2014 may well go down in the history books as the year that extortion attacks went mainstream." -Brian Krebs, security journalist.

    In this whitepaper you will learn about the skyrocketing ransomware infection rates, its history, ransomware families, cryptolocker and copycats, ransomware infection vectors and effective mitigation strategies.
  • Has SIEM Lost Its Magic? Top five reasons why SIEMs are failing security professionals
    Source: Sumo Logic
    White Paper: SIEM solutions have been around since 2000, and they were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches. But are they working? Are they delivering enough value? Have they lost their magic?

    In this whitepaper, we discuss the top five reasons why SIEMs are failing security professionals and suggest new emerging technologies that are starting to fill the gap.
  • The New Mindset for Building Secure Services in the Cloud
    Source: Sumo Logic
    White Paper: Cloud computing is reshaping not only the technology landscape, but the very way companies think about and execute their innovation process and practices. But as with any paradigm shift, cloud computing requires different rules and a different way of thinking. Too often there is unnecessary push back when venturing into unchartered waters. In this white paper, Joan Pepin - a recognized expert in Cloud Security - discusses 10 best practices for securely leveraging the cloud and capitalizing on this new disruptive shift with confidence and clarity.
  • Do You Fit the Profile That Wins More Sales
    White Paper: There are five main ways salespeople behave with customers, and groundbreaking research across thousands of sales professionals by CEB (formerly Corporate Executive Board) has now shown one profile crushes quota more than any other. Do you fit the profile? Learn the different types of sales personalities, and why "Challengers" are more successful.
  • The Cyber Threat Risk - Oversight Guidance for CEOs and Boards
    Source: LogRhythm
    White Paper: The time has come for CEOs and Boards to take personal responsibility for improving their companies' cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today.
  • Magic Quadrant for Security Information and Event Management
    Source: LogRhythm
    White Paper: The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
  • LogRhythm Security Intelligence Platform
    Source: LogRhythm
    White Paper: Protecting against today's rapidly evolving threat landscape requires broad and deep visibility across the entire IT environment. Threats arrive from many angles and evidence of their existence can be found within existing log and machine data. Further visibility is gained through targeted endpoint and network forensic monitoring. When this is applied to multiple, machine-automated analysis techniques, threats and risks are exposed like never before.
  • Info-Tech Research Group 2015 SIEM Vendor Landscape Report
    Source: LogRhythm
    White Paper: This research will help you select an appropriate SIEM solution based on vendor research, create an implementation roadmap, define your SIEM architecture, and measure the continued value of your SIEM.
  • Info-Tech Research Group 2015 SIEM Vendor Landscape Report
    Source: LogRhythm
    White Paper: This research will help you select an appropriate SIEM solution based on vendor research, create an implementation roadmap, define your SIEM architecture, and measure the continued value of your SIEM.
  • The Digital Enterprise Gets a Hand Up from the Dedicated Cloud
    Source: VMware and OVH
    White Paper: There is so much your company wants to accomplish as a digital enterprise, pushing business value ahead with the help of technologies that make it possible to drive greater customer engagement, enable higher sales conversions and even create new lines of business.
    The Dedicated Cloud has a central role in this mix, uniquely providing users a secure and confidential dedicated infrastructure along with the power of a managed cloud that affords ease of deployment and seamless workload management.
  • Automating the Security Lifecycle for the Cloud
    Source: Palerra
    White Paper: Enterprises are rapidly adopting the cloud for agility and improved productivity. However the cloud presents challenges in the areas of threat visibility and compliance. Some IT groups - already constrained by manpower and skills shortages - still use manual approaches to cloud security. But the volume of cloud usage and the relentless efforts by hackers far outpace these efforts.

    This white paper reviews the automation of three capabilities in the security lifecycle that enterprises must consider to mitigate risks while embracing the cloud:

    - Secure Configuration Management
    - Threat Detection and Prediction
    - Incident Response
  • Gartner Cool Vendors in Risk Management, 2015
    Source: Palerra
    White Paper: Digital business is creating a more complex and wider array of risks that must be well-understood by IT risk managers and well-articulated to a variety of stakeholders: boards of directors, senior executives, business and IT leaders. Three vendors provide new ways of managing this type of risk.
  • Infographic: Speed to Data Center Efficiency
    Source: Coresite
    White Paper: Read this infographic for an in-depth look at how a multi-tenant data center can optimize, connect and protect your data.

Results 1 - 15 of 566