Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...
CLEAR

White Paper | Presented by Sonatype

Use DevOps and Supply Chain Principles to Automate Governance

Read this research report to learn why governance processes that depend on manual inspection are guaranteed to fail and how managing the open source supply chain improves governance and reduces risk.

ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS

Companies needing to control user access to resources, whether that be restricting access to certain applications or access to specific web sites, often find it difficult to implement adequate user access controls. Sophos UTM on Amazon Web Services (AWS) provides organizations with an all-in-one security solution that enables them to easily enforce usage policies, control outbound access, filter content, defend against malware, and more.

White Paper | Presented by Citrix

Achieve GDPR Readiness with Secure App and Data Delivery Citrix

While the GDPR represents a significant challenge for organizations, its technical provisions align with established best practices for data privacy and protection, as well as with the security principles on which Citrix solutions are built.

The High Stakes of Business Security

Businesses put more on the table with every advancement in technology, so they have to manage risk. Data, network & app integrations are on the rise & so are cyber attacks.

White Paper | Presented by Exabeam

CISOs Investigate: User Behavior Analytics

The value of peer input cannot be overstated. This independent report, authored by leading CISOs who have deployed or are looking to deploy a user behavior analytics (UBA) solution, offers real-world use cases and buyer guidance for IT security practitioners.

White Paper | Presented by Exabeam

Detect Next-Gen Threats with Modern Security Intelligence

Security management is broken. Despite spending billions on SIEM technologies, organizations continue to get breached. Read this white paper to learn how Exabeam addresses the weaknesses of SIEM.

White Paper | Presented by Exabeam

How to Detect Compromised User Credentials with User and Entity Behavior Analytics

IT system access is the link between employees and the systems that allow them to create business value. Attackers know that if they can impersonate one (or more) of them, they can steal the business value they create. Read this white paper and learn how to detect and investigate user impersonation quickly and effectively.

White Paper | Presented by Exabeam

The Incident Response Makeover Guide

Incident response is a numbers game that rarely favors the defenders. The deluge of cyberattacks and sheer volume of alerts overwhelms security operations centers (SOCs) so thoroughly that security teams can barely keep up. To make over ineffective security analysis and incident response practices, organizations need to rethink their current playbook. Download the white paper and learn the ROI and operational benefits of a UEBA solution.

White Paper | Presented by Exabeam

The Incident Response Makeover Guide

Incident response is a numbers game that rarely favors the defenders. The deluge of cyberattacks and sheer volume of alerts overwhelms security operations centers (SOCs) so thoroughly that security teams can barely keep up. To make over ineffective security analysis and incident response practices, organizations need to rethink their current playbook. Download the white paper and learn the ROI and operational benefits of a UEBA solution.

White Paper | Presented by Akamai

Application Security and Performance

Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.

Load More