Skip Links

Network World

Resource Library

  • The Global CISO Study
    Source: ServiceNow Inc
    White Paper: Enterprises face a rising risk to their financial performance, operational continuity, and reputation from information security breaches. According to research from the Ponemon Institute, costs per breach have increased by 30% in the last three years, and companies face a 26% probability of a material data breach in the next two years. At stake is the very survival of these enterprises, but most organizations are not prepared to deal with imminent threats.

    ServiceNow's survey of 300 chief information security officers (CISOs) investigates the state of security response in large organizations and their strategies for navigating this challenging environment.

    The results show that enterprises are not responding effectively-and CISOs are worried about the growing list of ever-evolving threats.
  • Improve IT Operational Response With Automation
    Source: Everbridge
    White Paper: In the digital economy, IT service disruptions can cost businesses a fortune! Thus it's critical that enterprises have in place the tools and processes necessary to detect issues, identify the source, and initiate remediation as quickly as possible. This tech dossier explains how automation of the operational response process can help enterprises minimize downtime of mission-critical business applications and services.
  • 8 Ways to Build Your Business Advantage
    Source: AMS.NET | Cisco
    White Paper: In today's global economy, innovation matters. For teams to innovate rapidly and with great frequency,they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable.
  • Techniques for Dealing with Ransomware, Business Email Compromise and Spearphishing
    Source: KnowBe4
    White Paper: Phishing, spearphishing, CEO Fraud/Business Email Compromise (BEC) and ransomware represent a group of critical security threats that virtually every organization will encounter at some point - and most already have. This white paper addresses these critical security problems and offers 14 best practices for making organizations more secure.
  • Demystifying SDN for the Network Engineer
    Source: Cisco Systems
    White Paper: Software-defined networking (SDN) can be a big change for network engineers, as it introduces a greater level of automation to networks. But this change can benefit your organization, through improved efficiency, accuracy, simplicity, and power. Get the full picture - download our "Demystifying SDN for the Network Engineer" white paper now.
  • Application Security and Performance
    Source: Akamai
    White Paper: Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
  • Top 10 Things to Look for in a Cloud Security Solution Provider
    Source: Akamai
    White Paper: Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don't always volunteer. Use this list to be sure you've covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
  • Evaluation Guide: How to Choose the Right BI & Analytics Platform
    Source: Tableau Software
    White Paper: The transition to a modern business intelligence model requires IT to adopt a collaborative approach that includes the business in all aspects of the overall program. This guide focuses on the platform evaluation and selection. It is intended for IT to use collaboratively with business users and analysts as they assess each platform's ability to execute on the modern analytics workflow and address the diverse needs of users across the organization.
  • Redefining the role of IT in a Modern BI World
    Source: Tableau Software
    White Paper: As self-service analytics becomes the norm, the role of IT is evolving from a producer to a strategic partner. IT professionals are helping their organizations transition from a traditional top-down approach to analytics driven by IT to a self-service approach enabled by IT and led by the business. This change requires a new framework and overall strategy. Organizations must revisit past decisions supporting the core foundational components of a BI program - people, process, and platform - and make adjustments, as outlined in this paper.
  • Top 10 Business Intelligence Trends for 2017
    Source: Tableau Software
    White Paper: Over the last few years, data has become the lifeblood of organizations. Those that harnessed the power of this data by empowering business users found competitive advantage and were able to innovate faster. This change caused tension in organizations between the old way and the new modern approach to BI. Tension grew between control and agility, self-service and governance. IT and the business started partnering together to maximize the impact of their data.
    Where are things headed next? This paper highlights the top trends for 2017 including:
    * Modern BI becomes the new normal
    * Data literacy becomes a fundamental skill of the future
    * Advanced analytics becomes more accessible
  • The Modern Approach to Business Intelligence
    Source: Tableau Software
    White Paper: Your organization has plenty of data, and you understand the nuances of your marketplace. But traditional approaches to business intelligence are too slow, inflexible, and expensive. You need an approach to business intelligence that is governed and scales yet allows your business users to ask and answer their own questions with data.

    This report outlines seven key attributes of the modern approach to business intelligence that will help you quickly see, understand, and share analytics. Whether you're working with data in spreadsheets, warehouses, or across disparate data sets, consider these attributes when evaluating software tools to empower your entire organization - from executives to analysts, to IT, across departments and geographic locations, in the office and on the go.
  • 6 Discoveries IT Security Pros Need to know about SSL Inspection
    Source: A10 Networks
    White Paper: Encryption is necessary to protect online data in transit from being compromised. But the threat is continuously evolving. Bad actors are now leveraging SSL-based encryption to hide malicious activity from existing security controls and technology. Most security professionals recognize this growing threat, but few feel they are adequately equipped to address the problem. So how concerned should we be about this growing threat vector?
  • Hidden Encrypted Threats to Your Data and How to Uncover Them
    Source: A10 Networks
    White Paper: The cost of a data breach has steadily increased over the past several years, hitting $3.79 million, up from $3.5 million in 2015, according to the Ponemon Institute. In response, organizations are stepping up security practices, including data encryption. Encrypting a record can reduce its breach-related costs more than any other measure and extending this to communications is critical.

    Interest in encryption is also growing due revelations in recent years about the depth of surveillance by organizations like the U.S. National Security Agency. Protecting data privacy has become a top priority for many organizations.

    However, the growing adoption of encryption has created a new set of issues. With the bulk of all web traffic migrating toward SSL/TLS, it is easier than ever for cyberattacks and malware to hide behind the cipher. Security solutions that rely on visibility to monitor web traffic are now blind to a growing number of threats hiding behind encryption.
  • Uncover Hidden Threats in Encrypted Traffic
    Source: A10 Networks
    White Paper: To prevent attacks, intrusions and malware, enterprises need to inspect incoming and outgoing traffic for threats. Unfortunately, attackers are increasingly turning to encryption to evade detection. With more and more applications supporting SSL - in fact, is expected to account for 67% of Internet traffic by the end of 2016. SSL encryption represents not just a chink in enterprises' proverbial armor, but an enormous crater that malicious actors can exploit.
  • Validating DDoS Threat Protection
    Source: A10 Networks
    White Paper: This white paper is for security and networking professionals who are looking to protect their networks against the devastating effects of Distributed Denial of Service (DDoS) attacks. In this paper, you will learn more about the various types of DDoS attacks, the challenges that are involved with detecting and mitigating these attacks, and the importance of validating any threat protection solution for real-world performance.

Results 1 - 15 of 478