Skip Links

Network World

Resource Library

  • Forbes Insights Research: Betting on Big Data
    Source: Teradata
    White Paper: The time is ripe for big data and analytics initiatives to pull leaders ahead of the pack. New and varied sources of data, including weblogs, sensors and social media streams, are weaving their way into the analytics mix, making it easier than ever to create connections that convert into actionable insights. By analyzing everything from consumer transactions to location data, organizations are realizing key business advantages and achieving a measurable impact on revenue.
  • EIU Research Report: The Virtuous Circle of Data
    Source: Teradata
    White Paper: Data-Driven companies outperform their competitors when it comes to profitability, operational efficiency and innovation as revealed in a new survey from The Economist Intelligence Unit. Although many companies have invested significantly in gathering vast amounts of data on their business, industry, and customers, many still struggle to extract valuable insights. This report shares findings and outlines 3 stages to becoming data driven.
  • The Definitive Guide to the Data Lake
    Source: Teradata
    White Paper: This paper provides the definitive guide on the critical areas of importance to bring data lake organization, governance, and security to the forefront of the conversation to ensure a successful - and efficient - journey to the data lake.
  • Data is Just Data- The Unified Data Difference
    Source: Teradata
    White Paper: Companies too often start big data efforts from scratch, abandoning the analytics solutions they have in place. Instead, companies should simplify their efforts and leverage existing infrastructure. Read this white paper to learn how to gain a unified, 360-degree view of your company's data.
  • A New Strategic Approach to Data and Analytics
    Source: Teradata
    White Paper: Many confuse the adoption of big data technology with creating a coherent big data strategy and in the process are creating "big data debt". Learn the concepts and guidelines that remedy that debt and increases your long-term results by taking a new data and analytics centric approach.
  • Preventing Data Loss Through Privileged Access Channels
    Source: SSH Communications Security
    White Paper: A basic tenet of security is to apply the strongest safeguards to the highest value assets. Systems and IT administrators provide privileged users access to very high value assets and hosts across the enterprise. Their access rights include, to name a few, the ability to create new virtual machines, change operating system configurations, modify applications and databases, install new devices - and most of all, direct access to organization's protected data (financial or health, personnel, intellectual property, for example). If misused, the privileges they are granted can have devastating consequences.

    Simultaneously the extent of privileged access is expanding to entities outside the enterprise through outsourcing arrangements, business partnerships, supply chain integration, and cloud services. The growing importance and prevalence of third-party access is bringing matters of trust, auditability and data loss prevention to the forefront of security compliance and risk management.

    To be compliant against any type of standard or norms mandate privileged access to be secured by encryption, it is by default opaque to many standard layered defenses, such as next generation firewalls and data loss prevention systems. The resulting loss of visibility and control creates a heightened risk for undetected data loss and system damage as well as an attractive attack vector for malicious activity such as the stealing of information and disrupting operations, while hiding all traces from system audit logs. Auditors are always thoroughly testing privileged access controls as they are key controls for organizations such as those in the financial and health industries. Lack of visibility into administrator's activities will lead to audit exceptions.

    This white paper focuses on how organizations facing these issues of privileged access can effectively balance the challenges of cost, risk and compliance. It describes how privileged access governance can be made minimally invasive, scale to enterprise requirements, and most importantly, prevent costly losses and potential audit exceptions.
  • Four Essential Fundamentals to Increasing Agility in the Cloud
    Source: CommVault
    White Paper: It wasn't long ago that only the largest enterprises could afford to equip and maintain a secondary data center for disaster recovery. Thanks to public cloud services, that's no longer the case. However, even as the cloud can be credited with driving down the cost of backup and recovery, it can also be blamed for increasing backup and recovery's complexity. The IT organization must now protect and manage corporate data across multiple cloud environments, in addition to its own private cloud. This whitepaper explores how a single point of control for data protection and recovery can help IT organizations truly realize the benefits they've gained from moving data to the cloud in the first place.
  • 5 Steps to Migrate Your Applications to the Cloud Stress Free
    Source: CommVault
    White Paper: Enterprises want to move more operations to the cloud to better manage large data sets and they want to do so at reasonable cost, and with minimal disruption and complexity. In particular, larger enterprises are using private clouds to consolidate IT infrastructure. They see the appeal of freeing applications from a static infrastructure, and instead, moving these applications to the cloud where they can be more easily shared across the enterprise. At the same time, enterprises may want to continue to house some operations within their own infrastructure. This paper examines five easy ways to overcome concerns about managing increased data flows, and moving operations to the cloud and offers solutions to each concern.
  • Ensure Business Continuity - with a Modern Disaster Recovery Approach
    Source: CommVault
    White Paper: An overwhelming torrent of data has been unleashed due to Big Data, cloud computing, social media, mobility and the Internet of Things. The average enterprise struggles to provide enough storage capacity to house this data. Further, many have realized that the old patchwork of point products for data protection is no match for current data volumes. The reality is that the conventional address to backup and recovery is failing. Read this white paper to see how a modern approach to DR, consisting of multiple facets united on a common platform, can hope to achieve true resiliency come what may.
  • Mobile App Security Using Containerization
    Source: Good Technology
    White Paper: Containerization enables enterprises to protect corporate data on users' personal or corporate-owned devices without impeding user experience and privacy or applying overly intrusive security restriction. Download this slideshow, "Mobile App Security Using Containerization", to understand the top 10 must-haves for securing your corporate apps with fine-grained application-level control.
  • 5 Benefits of Disaster Recovery in the Cloud
    Source: CommVault
    White Paper: One of the biggest use cases for the cloud - in fact, the biggest, in the case of hosted private cloud - is for backup and disaster recovery. It adds up to one thing: Organizations are counting on the cloud to make sure they retain access to their critical corporate data. This paper explores why the cloud is well suited for disaster recovery and what organizations need to consider to ensure that cloud DR is right for them.
  • Managing Cloud Infrastructure for Test/Dev Teams: 5 Cloud Operations Tips
    Source: CommVault
    White Paper: When businesses began moving to the cloud, the first use case was obvious: Backup, along with disaster recovery. And after several years of success, enterprises are now looking for other use cases that can benefit from the cloud. That's why many organizations are starting to consider the cloud for their test/dev environments. This paper explores five key ways in the cloud makes sense for test/dev.
  • Top 5 Cloud Data Proection Challenges. Solved.
    Source: CommVault
    White Paper: The cloud is changing everything. It's transforming IT organizations with agility and efficiency like never before, enabling them to realize new IT-as-a-Service delivery models. Yet, with change also comes new challenges. Organizations are faced with rationalizing their move to the cloud, balancing its advantages and barriers as they chart the course of their cloud journey. As you develop your road map to cloud adoption, consider how these five challenges might impact your strategy. Then read on to see how you can solve them so that you can realize the full potential of your next cloud project.
  • Realizing the Promise of Software-Defined Networking
    Source: F5 Networks
    White Paper: In theory, software-defined networking empowers businesses to accelerate time-to-market, lower administrative costs, and reduce operational risk. In reality, only a programmable software-defined network can deliver those benefits. This white paper explains programmability's pivotal role in realizing the promise of SDN, outlining all of the components companies need to build a software-defined network that's fully programmable at Layers 2 and 3 and Layers 4 to 7.
  • 5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP
    Source: F5 Networks
    White Paper: To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.

Results 1 - 15 of 488