Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...
CLEAR

eBook | Presented by Ntirety

Security in the Cloud A Mighty and Mission-Critical Task

Read Security in the Cloud A Mighty and Mission-Critical Task and you’ll learn how to keep your data safe within the cloud.

eBook | Presented by Ntirety

How to Move On: Exploring DR Business Continuity

In How to Move On: Exploring DR Business Continuity, we’ll show you how to use a hybrid cloud environment to preserve your vital data, plus the connection between security and disaster recovery. Download the eBook today!

eBook | Presented by Ntirety

Success and the Cloud

Read Success and the Cloud: How to Triumph Over Migration Challenges to hear from companies like yours about how they overcame challenges and found solutions that addressed their business needs. Download the eBook today!

Video/Webcast | Presented by TrustMAPP

Understanding Trust and the Economics of Insecurity

Cyber security is at a pivotal moment in history where more products are available to security teams than ever before yet investments in more cyber security products and services alone does not align a fiscally responsible team with an adequate security posture.

Compliance is More Critical Than Ever

Efficient and effective compliance management protocols are an absolute requirement in financial services

2018 Annual Cybersecurity Report At-A-Glance: Cloud Security

The Cisco 2018 Annual Cybersecurity Report for Cloud Security examines the techniques and strategies that adversaries use to break through defenses and evade detection. Get the at-a-glance report for cloud security.

Video/Webcast | Presented by Sophos

7 Uncomfortable Truths of Endpoint Security

Join this webinar to discover what 3,100 IT managers had to say when it comes to endpoint security.

Apple vs. Dell: A Workstation Buyer’s Guide

When buying a workstation, price-performance matters. But it’s not the only consideration. Also important is aligning features and capabilities with user software applications and workloads. So are system optimization, expandability, reliability and support. While many buyers—especially for graphics, video and multimedia fields—might consider Apple’s iMac, iMac Pro and MacBook Pro models, they may be selling themselves short in many ways. This paper provides a checklist for buyers to compare Apple’s newest high-end offerings with the latest Dell Precision workstations.

At-A-Glance: Cisco Umbrella: Reporting You Can Count On

Deploying a Cisco Umbrella free trial is simple. But to get the most out of your trial, after you’re up and running, these three reports are a great place to start, since they give you a more complete picture of the security risks within your organization.

Video/Webcast | Presented by Sophos

Phishing – The Greatest Secret

Download this webinar to learn about the dark world of phishing and how you can fight back with Sophos Phish Threat.

Load More