Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

Business Perception of IT Security: In the Face of an Inevitable Compromise

The security industry finds itself at the point when traditional solutions do not cover some new threats and businesses are still uncertain about 'beyond-prevention' methods like staff training, security audits and consulting. These new methods of protection are strikingly different from the old ones, and may initially seem a bit more difficult to deploy and measure results. So what's the right approach?

Citrix Customers Put Google Chromebooks to Work

Work is no longer where we go in the morning, work is what we do - what we get done. Watch this Citrix and Google webcast to learn how you can implement a secure, fast, simple and sharable solution within your organization today.

eGuide | Presented by RSA Security Inc

eGuide: New Era of Identity Management

This eGuide from CSO and Network World discusses why enterprise organizations must make identity management an essential component of business processes and security, how security requirements are driving identity management, and where IAM is headed.

White Paper | Presented by Citrix Systems

Realize the Full Potential of VDI

Companies are often challenged to implement new solutions or deliver enterprise-level services using smaller IT teams and lower budgets. Nutanix InstantON VDI for Citrix simplifies and accelerates virtual desktop (VDI) deployments for companies of any size. If you are new to VDI or looking for a way to grow your VDI footprint, Nutanix and Citrix deliver better end-user performance at an affordable price point.

Top 6 Things Small Businesses Need to Know About Cybersecurity

Small businesses often lack the budget, staff, and sophistication to assemble strong defenses, making them an easy target where the chances of thieves getting caught is much lower. Making sure your business is adequately protected can seem like an overwhelming undertaking. We've compiled a list of the top things startups and small businesses need to know about cybersecurity to help you get started.

When Cryptors Attack: Timeline of a Ransomware Infection

The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.

Whodunit: The Mystery of the APT

Cybercriminals can be certain about a few things, including: Most companies store their important data on their networks; Intellectual property is highly valuable; Many companies don't understand the latest security practices; This is a growing and lucrative market. Learn how to better protect yorself

White Paper | Presented by Insight

Bridge the Talent Gaps in Your IT Team

There is a talent challenge that has led to a spike in outsourced managed service providers. To offload your IT tasks to a managed service provider without losing control of your infrastructure, you need to strike the right balance between leveraging outside resources and efficiently relying on your full-time team. Here are the most popular options for mature IT operations and what your business should consider.

White Paper | Presented by CenturyLink

CenturyLink Cloud Application Manager Solution Brief

Cloud Application Manager enables customer IT transformation by orchestrating the delivery of infrastructure, applications and services across multiple clouds.

White Paper | Presented by CenturyLink

Choose the Right Hosting Solutions for Global Digital Business Initiatives

Enterprise architecture and technology innovation leaders that are launching digital business initiatives on a global basis can use our decision tree to choose the right infrastructure hosting options.

Load More