Skip Links

Network World

Resource Library

  • Cisco 2014 Midyear Security Report: Identifying Weak Links
    Source: Cisco Systems
    White Paper: Adversaries spend 100 percent of their time finding weak links and using them to their advantage. And as the Internet of Things accelerates and our dependence on the connected environment continues to expand, so do opportunities for attackers.

    Download the Cisco 2014 Midyear Security Report to learn about the different types of vulnerabilities that exist in the systems we rely upon, including the Internet itself, and what can be done to reduce their number and impact.

    This report explains:
    - The significant drop in the number of exploit kits since February
    - The challenges with catching Java
    - Industry risks across verticals

    Understand the tactics so you can thwart these industrious adversaries.
  • Next Generation Firewall Security Value Map
    Source: Cisco Systems
    White Paper: Cisco ASA with FirePOWER Services is the industry's first threat-focused next-generation firewall (NGFW). According to a recent NSS Labs test, Cisco ASA with FirePOWER Services achieved 99.2 percent security effectiveness, the highest score among all tested NGFW products.

    Announced earlier this month, Cisco ASA with FirePOWER Services surpasses legacy NGFW offerings with unprecedented multi-layered protection for integrated threat defense.

    This threat-focused approach was previously available only on FirePOWER appliances. It is now available across the entire Cisco ASA product line for companies of all sizes. Customers can be confident that they will receive the best protections possible, regardless of deployment mode.
    The NSS Labs NGFW reports provide the details on how Cisco models achieved:
    - Consistent, industry-leading security effectiveness
    - Strong resistance to evasion
    - High performance above published throughput
    - Competitive total cost of ownership
  • Cisco 2014 Midyear Security Report: Identifying Weak Links
    Source: Cisco Systems
    White Paper: As the Internet of Things accelerates, adversaries will spend even more time finding weak links across the threat landscape and using them to their advantage to compromise systems and data. Download the Cisco 2014 Midyear Security Report to learn about these threats as well as industry-specific risks.
  • Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
    Source: Cisco Systems
    White Paper: Today's threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It's time for a new security model that addresses the full attack continuum - before, during, and after an attack.
  • String of Paerls Infographic
    Source: Cisco Systems
    White Paper: Analysis was conducted on 45 days' worth of samples and clustered together based on a matching set of alert criteria. This process reduced more than 1 million detailed sample reports to just over 15 thousand sample clusters that exhibit similar behavior.
  • Buyer's Criteria for Advanced Malware Protection
    Source: Cisco Systems
    White Paper: Download Buying Criteria for Advanced Malware Protection for an up close look at what it really takes to effectively deal with advanced malware along with recommended guidelines for making advanced malware protection purchase decisions.

    - Learn how to accurately compare advanced malware protection offerings
    - Get a list of key questions to ask anti-malware vendors depending on your needs
    - Identify capabilities to ensure you are selecting products that provide protection along the full attack continuum - before, during and after an attack
    - Understand what you need to protect your extended network that also includes secure gateways, endpoints, mobile devices and virtual systems
  • Securing the Modern Data Center: Building Proper Security Controls, Policies, and Processes to Address and Mitigate New Risks
    Source: Cisco Systems
    White Paper: Modern data centers have and continue to undergo transformation. Driven by familiar trends, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before.

    This paper reviews three data center trends and their risks, as well as highlights how Cisco solutions can help you:
    - Provide visibility into virtual infrastructures
    - Deliver comprehensive, real-time network visibility
    - Enable bigger and faster networks
  • Cisco FireSIGHT Management Center: Context-Aware and Adaptive Security
    Source: Cisco Systems
    White Paper: If you don't have total visibility into everything on your network -- physical and virtual hosts, operating systems, applications, services, protocols, users, content, network behavior, as well as network attacks and malware -- you're giving sophisticated attackers an advantage.

    With total visibility you gain contextual awareness to make more informed security decisions like:

    - Identifying and blocking threats
    - Monitoring suspicious behavior
    - Controlling unauthorized systems and applications

    It's time to get the visibility -- and the good night's sleep -- you need. Download the white paper to learn how.
  • Five New Laws of Antimalware Protection: Keep Up with Evolving Threats
    Source: Cisco Systems
    White Paper: Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat. If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.

    Current research suggests as much as 75% of new viruses are seen on a single endpoint and only about 40% of new malware even gets detected. It's not a question of if your network will be attacked. It's a question of when it will happen and how you will respond.

    Download this report now to learn the 5 New Laws of Anti-Malware and how you can protect your networks from the newly-evolving threat landscape.
  • Enhancing Database Environments with NetApp Storage
    Source: NetApp
    White Paper: Organizations of all kinds rely on their relational databases for both transaction processing and analytics, but many still have challenges in meeting their goals of high availability, security, and performance. Whether planning for a major upgrade of existing databases or considering a net new project, enterprise solution architects should realize that the storage capabilities will matter. NetApp's systems, software, and services offer a number of advantages as a foundation for better operational results.
  • Attributes of SAN Storage Required for Business Critical Workloads
    Source: NetApp
    White Paper: Organizations expect their IT departments to deliver a SAN storage infrastructure that can support faster rollout of applications and services, continuous and fast access to data in key applications, and efficient scale to address corporate data growth without comparable growth in IT expenses. This IDC white paper reviews the key SAN storage features required to meet such challenges and the NetApp SAN storage portfolio offerings that best address your needs.
  • Hardware Optimized Storage for Business Critical Applications
    Source: NetApp
    White Paper: Organizations today are increasingly information-driven, requiring them to create, organize, and store more data every day. To handle the conversion of "data to information", you need an agile and scalable infrastructure which will provide the backbone to run multiple business-critical workloads simultaneously. This IDC white paper examines the need for the NetApp FAS8080EX hardware-optimized platform to help organizations transform into data-driven entities, adopt newer technologies, and invest in business-critical applications to stay ahead of their competition.
  • Enterprise Storage for Performance-driven Databases
    Source: NetApp
    White Paper: IT managers and line-of-business stakeholders are striving to increase efficiency of their application environments. The biggest challenges they face in supporting database environments are managing data growth and database size, and meeting database performance requirements. This ESG Lab Report documents the performance, reliability, availability, and serviceability of NetApp EF Series flash arrays in Oracle database environments.
  • Scaling SaaS Delivery for Long-Term Success
    Source: Equinix
    White Paper: Thanks to increased SaaS adoption, there is greater opportunity for providers to expand their customer bases. This paper provides recommendations for SaaS executives on using the cloud to increase market share and retaining their customers amid a growing number of consumer options.
  • Quality in the Cloud: Best Practices for ISVs
    Source: Equinix
    White Paper: Independent Software Vendors (ISVs) looking to enter the cloud market must exercise due diligence in choosing a hosting company, or risk quality of service. This GigaOm report offers ISVs guidance on determining whether their hosting partners can support their specific market needs.

Results 1 - 15 of 551