Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...
CLEAR

eGuide | Presented by SonicWall

Cybersecurity and the mobile workforce

As we head into the fifth month of this pandemic, and businesses begin to ponder their plans for the fall, the safety and security of their staff—and of their corporate data and processes—is paramount.

Global Trade Management Best Practices and Critical Capabilities to Outpace Change

Global Trade Management (GTM) is a hot topic in supply chain circles, and all companies involved in international trade are likely to be affected in some manner by changes resulting from Brexit, the USMCA, and US/China trade agreements.

Global Trade Management Best Practices and Critical Capabilities to Outpace Change

Global Trade Management (GTM) is a hot topic in supply chain circles, and all companies involved in international trade are likely to be affected in some manner by changes resulting from Brexit, the USMCA, and US/China trade agreements.

White Paper | Presented by Automattic

Test Asset

Test

Actionable Guidance to Succeed in Enterprise-Class Privileged Access Management

Get actionable guidance on how to advance your PAM implementations regardless of where you are currently in your security management journey.

White Paper | Presented by (ISC)²

2020 Cloud Security Report

This 2020 Cloud Security Report has been produced by Cybersecurity Insiders to explore how organizations are responding to the evolving security threats in the cloud and the continued shortfall of qualified security staff.

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN

While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network.

Enforce a Zero Trust Security Model in Today's Hostile Environment

Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.

How to Guide: Zero Trust Security Transformation

A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats.

Video/Webcast | Presented by Armis Inc.

I Don't Know What I Didn't Know: How I Solved the IT Asset Inventory Challenge

Join Mark Sutton, CISO of Bain Capital, and Curtis Simpson, CISO of Armis, as they discuss their experiences in the trenches and how they got a complete picture of all the devices across their organizations - without using agents.

Load More