Skip Links

Network World

Resource Library

  • CloudFlare Advanced DDoS Protection
    Source: CloudFlare
    White Paper: Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks-attacks that simply cannot be addressed by traditional on-premise solutions.
    In this whitepaper, you'll learn the anatomy of each attack method and how to protect your web presence from attacks, such as Layer 3 and 4, DNS amplification, SMURF, ACK, and Layer 7.
  • Application Performance Optimization: Tackling the Challenges of a Remote and Mobile Workforce
    Source: Riverbed Technology
    White Paper: More than half of today's enterprise workforce transitions between the office and working remotely. Supporting this increasingly remote and mobile workforce puts significant pressure on IT teams to deliver seamless connectivity and superior application performance to any location. Learn how you can boost productivity and improve both employee and customer experiences by improving application performance to the edge of the enterprise in this white paper.
  • NexGen Storage: Delivering Quality of Service with VMware vSphere 6 and Virtual Volumes
    Source: Pivot3 Inc
    White Paper: Pivot3 recently acquired NexGen. And here's why. With data growing at an increasing rate, organizations are looking for ways to consolidate their IT infrastructures. Virtualization technology has helped to accelerate that consolidation, but new challenges related to provisioning, management, and support have presented themselves.

    NexGen Storage is leveraging its purpose-built software architecture to simplify the operational model through QoS and policy-based management. With QoS, organizations can better align business priorities and SLAs to their business. If you are looking to dynamically manage application performance based on policy-based QoS that better align customer expectations with application performance SLAs, ESG Lab suggests taking a look at Pivot3's flash arrays from NexGen.
  • The Foundation for Cloud-first, Mobile-first IT
    Source: Okta
    White Paper: Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it's accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authentication policies all follow from a well-tuned user lifecycle and access governance foundation.
  • A New World Order for IT
    Source: Okta
    White Paper: With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners - and even intelligent objects like connected cars and monitoring systems - and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring.
    IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
  • Businesses @ Work, March 2016
    Source: Okta
    White Paper: Have you ever wondered which enterprise cloud apps are most popular? Or which industries tend to use Office 365 versus Google Apps? Did you know that 43% of Okta customers have enabled deprovisioning? From where we sit, Okta has a unique view into the adoption and utilization of cloud apps in the enterprise. Our Businesses @ Work report takes an in-depth look into how organizations and people work today, and the apps and services they use to be productive.
  • Top 5 Reasons to Automate Identity Lifecycle
    Source: Okta
    White Paper: Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive.

    When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace.

    This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
  • Three Critical Considerations to Achieve Information Governance
    Source: CommVault
    White Paper: Information governance has never been as challenging or as important as it is today. Companies are creating and collecting data faster than ever before. IT organizations must be able to manage and protect data to reduce business risk, minimize data costs and meet regulatory compliance requirements. That means understanding what data you have, what it's worth and when you can dispose of it. To help, here are three critical considerations that will help you unlock the true benefits of information governance.
  • Drowning In Data Management Complexity?
    Source: CommVault
    White Paper: IT faces a chaotic technology landscape these days. Rampant data growth, the cloud, mobility, Big Data, and the Internet of Things and SDS are just a few of the drivers of immense change. Managing a growing number of diverse SLAs and KPIs in this climate is no small task. According to 451 Research, organizations are experiencing severe pain associated with current methods of back and recovery due to the explosion of capacity, particularly in Big Data and other huge environments.

    The key to success is to find a way to lessen complexity, reduce risk, and harness IT resources where they can achieve the greatest tactical and strategic gains in productivity. But where should you start? Here are some of the vital areas to address those goals.
  • Will You Recover if Disaster Strikes?
    Source: CommVault
    White Paper: Most organizations have a secret they don't want to admit: they are not confident that their DR strategy will actually get them back up and running after a disaster hits. Historically, the traditional methods of conducting DR proved to be too cumbersome, not to mention simply too expensive. Few could afford to set up a secondary site that mirrored the primary site in every hardware and software detail. And even in the best case scenarios, DR fell short -- restorations failed due to backup failures, system configuration errors or human error. Those who opted for lower-cost approaches were left to hope a disaster never happened. If it did, they were left to pick up the pieces. Unfortunately, many never recovered from a major outage event. To overcome these challenges, read these five principles of highly effective disaster recovery.
  • Why Laptop Security Cannot Wait
    Source: CommVault
    White Paper: Laptop theft can strike at the heart of a company's reputation and revenue, and serious data breaches from stolen laptops can happen to any company, regardless of size. Although the majority of user devices will not be seriously compromised, they are all at risk for serious data loss and exposure. Read the six critical functions that work together to efficiently secure endpoint data.
  • Lower MPLS Cost - Increase QoS with Citrix SD-WAN
    Source: Citrix Systems
    White Paper: Citrix SD-WAN increases application reliability and lowers networking costs:
    - Measure and monitor network paths
    - Application fluency
    - Prioritize critical application performance
    - Traffic shaping and dynamic bandwidth reservation
    - Failover and survivability
    - Packet reordering and loss mitigation
  • The Boom in Unified Communications
    Source: C Spire Wireless
    White Paper: Unified Communications (UC) is quickly moving up on many companies' priority lists. According to a report from InformationWeek, almost half of all companies have deployed UC. A solid majority of these companies say the ROI from unified communications has met or exceeded their expectations.
  • Finding Your Cloud: A down-to-earth guide to cloud planning
    Source: C Spire Wireless
    White Paper: Given how entrenched "the cloud" has become in the business/IT lexicon, it's not surprising to see growing enthusiasm for the potential and power of cloud computing. A study from IDG found that half of executive-level managers see cloud computing as transformational to their business.
  • Unlocking the Value of VoIP
    Source: C Spire Wireless
    White Paper: Small businesses have been the earliest and fastest adopters of Voice over IP (VoIP) largely due to phone call cost reduction. Now, VoIP has added competitive capabilities such as unified communications and auto attendant, that previously were restricted to expensive PBX telephone systems.

Results 1 - 15 of 684