Skip Links

Network World

Resource Library

  • Private Cloud for the Mid-Sized Enterprise
    Source: ZeroStack
    White Paper: This white paper dives deep into the complexities of building highly agile and secure private clouds in enterprises with limited personnel and budget resources, and takes a vendor-neutral look at how to make private cloud projects successful.
  • The Blind State of Rising SSL/ TLS Traffic: Are Your Cyber Threats Visible?
    Source: F5 Networks
    White Paper: Security solutions designed to monitor network traffic to detect threats and prevent data leakage are becoming less effective as a result of the growing volume of bandwidth associated with cloud-based services and the rising amount of encrypted traffic, according to the results of an IDC survey commissioned on behalf of F5 Networks. This white paper provides an overview of SSL/TLS as well as its current status in enterprise adoption and its impact on the enterprise IT. The document also discusses security issues and challenges associated with failing to inspect SSL/TLS traffic.
  • How Identity Management Can Accelerate Digital Transformation
    Source: Okta
    White Paper: A hidden key to your digital transformation success: assuring simple and secure access to mission critical applications - any device, anywhere. In this research report from IDG, see how your peers see their role in going digital, and why 75% of them say identity management is crucial to enabling digital business. The report covers:
    - Areas of prioritization
    - Progress levels
    - IAM challenges
    - IaaS deployment
  • Critical Steps and Best Practices for Making DDoS Mitigation Part of Your Incident Response Plan
    Source: Akamai Technologies
    White Paper: When a DDoS attack cripples or brings down a site or other application, knowing whom to call first and how to marshal the required resources for mitigation can make the difference between organization-wide panic and a calm, orderly response. Read this paper to learn best practices for making DDoS Mitigation part of your incident response plan.
  • Case Study: 362 Gbps DDoS Attack
    Source: Akamai Technologies
    White Paper: On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
  • Case Study: xss Exploitation through Remote Resource Injection
    Source: Akamai Technologies
    White Paper: Akamai's Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
  • Compare Approaches for Web, DNS, and Infrastructure Security
    Source: Akamai Technologies
    White Paper: How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale-you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
  • Akamai Cloud Security Solutions
    Source: Akamai Technologies
    White Paper: Akamai makes online business fast, reliable and secure. We earned our global reputation by building the world's fastest and largest cloud-enabled delivery platform, which is backed by the most scalable, distributed security solution available. Learn about the security solutions that help protect companies in every industry be secure online.
  • Manage, Don't Mitigate: What You Need to Know About Bots and Scrapers
    Source: Akamai Technologies
    White Paper: In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
  • Operationalize and Embed Your Analytics for Action
    Source: OpenText
    White Paper: This TDWI Report focuses on how organizations can operationalize analytics to derive business value. It provides in-depth survey analysis of current strategies and future trends, and 10 best practices for embedding analytics successfully across the organization.
  • Identify the Right Analytic Capabilities for Success
    Source: OpenText
    White Paper: This research by DMS compiles an analysis of the different types of analytic capabilities available today-from reporting and data discovery to advanced analytics- to help organizations choose the right solution depending on the kind of decisions, the business situation and the target user.
  • What are You Doing with Your IoT Data?
    Source: OpenText
    White Paper: Internet of Things increases the need for analytics, since the data it generates breaks previous records in terms of size, speed, and complexity. Read this paper to learn how to better understand this data, sift out irrelevant information and support data-based decision-making.
  • Pay it Forward: Solving Three Key Challenges in Payments Processing
    Source: IBM Corporation
    White Paper: The stakes are high. In this ebook, IBM analyzes the top three payments challenges that confront merchants and billers, and outlines solutions to address immediate needs while future-proofing a payments system to adapt to continued change.
  • eBook: Adaptive Network Control Solutions
    Source: Level 3 Communications
    White Paper: In today's enterprise, the network is critical. Do you want to sharpen your competitive edge? Integrate a fast, easy and highly scalable solution that allows your network to move with your business like never before. Learn how you can enable greater visibility and gain more granular control over network functions to seamlessly adjust to shifting demands all while controlling costs.
  • A Conversation: Make Your Network Work Smarter, Not Harder
    Source: Level 3 Communications
    White Paper: Make no mistake, today's organizations run on their networks. And network decisions are business decisions. If you expect to thrive, your network must be able to respond instantly to changing requirements. It needs to help control costs and improve productivity. That's where the new capabilities of Level 3 Adaptive Network Control Solutions (ANCS) deliver real advantages.

Results 1 - 15 of 460