Skip Links

Network World

Resource Library

  • Mitigate Risk and Accelerate Time to Value
    Source: Delphix
    White Paper: Making your IT organization more elastic and efficient is hard. Doing it while staying in compliance with regulations is even harder. Download this white paper to learn how your IT organization can accelerate business, introduce new services, and reach new markets, all while staying in compliance.
  • Reduce IT Burdens: Regulation, Legal Hold & Discovery
    Source: Delphix
    White Paper: Companies too often overlook the business gains a better archiving strategy can deliver, from enabling access to and preservation of critical data to more easily complying with regulations. Download this white paper to learn how Delphix can be an integral part of ensuring your archiving strategy actually enables your business.
  • IDC Report: Optimize IT and Business Gains
    Source: Delphix
    White Paper: Data is increasingly critical to driving business. This IDC Whitepaper outlines how CIOs can understand what the "total cost of data" is across their entire organization and how Delphix can assist them in managing the data that drives the business forward.
  • Evolving Your Data Center? Evolve Your Data Center Security
    Source: McAfee
    White Paper: Traditional technologies for securing the evolving enterprise data center are being adapted by leading solution providers to work across a broad range of datacenter deployment scenarios. Enterprise buyers should look for solution providers that have explicitly adapted their solutions to work together in a layered, defense-in-depth approach for data center security.
  • Aberdeen: Securing the Evolving Datacenter
    Source: McAfee
    White Paper: This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the evolving datacenter, which spans both private and public clouds.
  • Safeguarding the Next-Generation Data Center
    Source: McAfee
    White Paper: Use of virtual and cloud servers has exploded. Unfortunately, security often lags behind. McAfee recommends looking at innovative solutions in order to erect a protective perimeter around your virtual and cloud servers.
  • SANS: Protecting Virtual Endpoints with McAfee Server Security Suite Essentials
    Source: McAfee
    White Paper: Migrating data to the cloud has led to a hybrid system with both physical and virtual systems, often leaving precious data exposed. Learn how McAfee Sever Security Suite Essentials secures data and closes exposure gaps.
  • SANS: Next-Generation Datacenters = Next-Generation Security
    Source: McAfee
    White Paper: The rapid shift to virtualized and cloud-based infrastructure, both internally and hosted within cloud service provider environments, opens new layers of risk to IT resources. In this paper, we break down the foundations of a virtual infrastructure, examine security tools and controls that are available for these layers, present the pros and cons of different approaches, and take a look at some new technology that may allow security teams to implement more flexible and capable protection models in virtual and cloud-based datacenters.
  • Advanced Evasion Techniques for Dummies
    Source: McAfee
    White Paper: Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here's advice on how to evade AETs.
  • Protect Against Advanced Evasion Techniques
    Source: McAfee
    White Paper: Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.
  • Augmented VPN
    Source: McAfee
    White Paper: Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
  • Demand More, Get the Most from the Move to a Next-Generation Firewall
    Source: McAfee
    White Paper: Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
  • The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs)
    Source: McAfee
    White Paper: In early 2014, McAfee commissioned research group Vanson Bourne to determine the level of understanding IT security professionals have about AETs and the defenses they have put in place to stop them. The findings, summarized in this executive summary, show that most respondents do not fully understand AETs and, as a consequence, are not deploying comprehensive security solutions to thwart them.
  • Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques
    Source: McAfee
    White Paper: Sophisticated cybercriminals are using advanced evasion techniques (AET), which deliver an exploit or malicious content into a vulnerable target so that the traffic looks normal, to bypass most existing security solutions. McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect this type of attack. It has been successfully tested against more than 800 million AET variants.
  • Agile Masking Transforms Data Security
    Source: Delphix
    White Paper: Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix's Agile Masking solution is the only product that solves both masked data creation and delivery challenges.

Results 1 - 15 of 551