Skip Links

Network World

Resource Library

  • A Framework to Surface Cyber Threats via Security Intelligence
    Source: LogRhythm
    White Paper: The Security Intelligence Maturity Model (SIMM) provides a systematic guide for an organization to assess and actively achieve a heightened security posture. Find out where your organization sits on the SIMM and identify gaps that need to be filled.
  • Magic Quadrant for Security Information and Event Management
    Source: LogRhythm
    White Paper: LogRhythm positioned in leaders quadrant of Gartner's 2014 SIEM Magic Quadrant Report for the 3rd consecutive year. The Magic Quadrant is a yearly analysis of the SIEM market that examines market driving innovations & compares leading competitors.
  • Understanding the Advanced Persistent Threat
    Source: LogRhythm
    White Paper: Due to the difficulty of detection, APTs are a growing concern in the security industry. Traditional security tools must be combined with Security Intelligence to properly detect and respond to APTs.
  • How to Avoid The Top 7 Risks of Cloud File Sync and Share
    Source: AeroFS
    White Paper: All too often, unauthorized Shadow IT projects move sensitive and proprietary data to the cloud without understanding critical security implications, such as:
    - Bypassed Data Security
    - Data Theft
    - Third-party Data Access
    - Risks to Compliance
  • The Critical Need for Enterprise-Grade File Sync and Share (EFSS) Solutions
    Source: AeroFS
    White Paper: This analyst report focuses on the usage of consumer-focused file sync and share (CFSS) in the workplace, various implications of CFSS and recommendations for organizations that seek enterprise file sync and share (EFSS) solutions to the problems.
  • The Rising Popularity of Unified Communications in the Cloud
    Source: Windstream Communications
    White Paper: Cloud adoption for all Unified Communications applications will increase in 2015. Business and IT advantages-such as reducing capital costs, enabling more participation and improving agility-are driving deployment growth. Windstream presents this download of the Nemertes 2014-15 Benchmark Report that provides a detailed assessment of UC in the cloud. In this report, you will gain valuable insight on cloud adoption for UC-across industries and around the globe. This report offers valuable analysis on:

    * Top trends of UC in the cloud
    * How migrating UC to the cloud can benefit your organization
    * Which UC applications are leading adoption and at what rates
    * Key considerations and recommendations for moving UC to the cloud

    Learn why cloud adoption for Unified Communications is becoming increasingly popular, and find out how to leverage the benefits of the cloud for your organization to meet your strategic goals. Download the report now!
  • Maturing and Specializing: Incident Response Capabilities Needed
    Source: HP
    White Paper: The SANS 2015 survey of the incident response capabilities of more than 500 security professionals found good news and bad news. The good news is that reported malware incidents, breaches, and remediation time declined slightly compared to last year, indicating a maturing of defenses and incident response capabilities. The bad news is 37 percent of respondents said their teams are unable to distinguish malicious events from nonevents, and most organizations still experience significant impediments to incident response.

    Read the 2015 survey results to learn:
    - The kind of data most targeted by hackers
    - Remediation practices used by respondents
    - The threat intelligence and detection technologies that work
    - The greatest impediments to fast and effective response
  • Turn IT Challenges into IT Opportunities
    Source: PC Connection
    White Paper: In this white paper, you will learn how Cisco, EMC, and Microsoft have integrated best of breed technologies to unify computing, networking, and storage resources into a single platform.
  • Intelligent Power Management: Strategic Key to Optimized Virtualization
    Source: Dell | Eaton
    White Paper: Looking for the best way to extend and enhance the benefits of virtualization? The answer could be hiding in plain sight in your data center - power management. In this white paper, learn how Intelligent Power Management solutions like those offered by Eaton can increase infrastructure flexibility, agility, and reliability by monitoring and managing power consumption - all while ensuring high performance in the virtualized environment.
  • Vulnerability Management Begins at the Endpoint
    Source: Qualys Inc.
    White Paper: As mobility and the global network infrastructure expands, the need for security assessment and policy compliance is essential. See how CIOs, CSOs and CTOs can stay ahead of evolving global network security and read about the next phase of innovation in security assessment.
  • 7 Reasons You Need Predictive Analytics Today
    Source: IBM
    White Paper: Learn why advanced analytics tools are essential to sustain a competitive advantage.
  • Infographic: Predictive Analytics Provides FP&A Advanced Capabilities
    Source: IBM
    White Paper: View this infographic from the Aberdeen Group to compare metrics and results from organizations that utilize advanced analytics in their financial planning and forecasting and the percentage in their confidence in creating a more reliable view of their outcomes and accurate scenario analysis.
  • Digitizing Financial Services Systems to Win on Customer Experience
    Source: Capriza
    White Paper: The financial services industry is being disrupted by new market entrants offering fast, mobile, immediate transactions. Find out how banks and other financial institutions are retooling their existing applications to deliver on exceptional customer experiences and remain competitive in the market.
  • Modernize Existing Systems to Deliver Exceptional Customer Experiences
    Source: Capriza
    White Paper: Industries are being shaped today by the dramatic shift in consumer expectations. New companies are emerging that are delivering fast, mobile, immediate transactions. Find out how established enterprises are retooling existing applications to deliver cutting-edge customer experiences and remain competitive in today's market.
  • IPM Equals Business Continuity
    Source: Dell | Eaton
    White Paper: IT professionals depend on software to increase resiliency while cutting capital expenses. But don't take it from us, here is what IT professionals have to say about software and its impact on business continuity.

Results 1 - 15 of 587