Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

White Paper | Presented by Google

Google Endpoint Security Research Brief

In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records. Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device. Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.

White Paper | Presented by SlashNext

10 Ways Hackers Evade the Sandbox

NSS labs recently published an evaluation of seven breach detection systems from FireEye, Cisco Check Point, Fortinet, LastLine and TrendMicro. Not surprisingly, the report shows that five out of the seven products tested missed evasions.

White Paper | Presented by Box

2017 State of Information Management: Are Businesses Digitally Transforming of Stuck in Neutral?

Transforming your content by making it accessible in the cloud is the first step to digital transformation. Where are you on this journey?

White Paper | Presented by Box

5 Considerations for Transforming ECM with Cloud Content Management

It's never been more important to focus on deploying a platform that works across all of your content so you can get more value out of each asset and protect yourself against technology stagnation. Check out our ebook and learn how to bring your people and information together in the cloud.

White Paper | Presented by Box

5 Counterintuitive Mistakes Companies Make When Going Digital

This eBook highlights five counterintuitive mistakes frequently made by organizations that seem rational when building a digital strategy, but actually can be course-altering mistakes. It also provides an alternate path to achieving the same objectives using approaches common in successful digital companies.

White Paper | Presented by VendorHawk

5 Critical Best Practices For Purchasing SAAS

The way software is purchased drastically changed when the Software-as-a-Service (SaaS) model started to become the norm. As cloud-based services focused heavily on the end user, SaaS applications are easier than ever to purchase and download.

White Paper | Presented by Box

5 Reasons Why the SaaS Revolution Needs a Unified Content Strategy

As the needs of organizations grow more complex, delivering enterprise content that addresses the shift to mobility, usability and flexibility are key. Enterprise SaaS applications are creating demand for a new "inside-out" view of content management, extending capabilities to organizations and users who never had access. Until now.

White Paper | Presented by NetApp

Building the Business Case for the Next-Generation Data Center

As the business landscape continues to evolve, how organizations manage data needs to keep pace. The next-generation data center is up to the challenge.

Complying with GDPR What All Organizations Need to Know

Regulators are increasingly concerned about the way in which financial services organizations hold and manage data - particularly where the actions of a financial services organization could expose customers to identity theft. Learn how data protection laws and the new European General Data Protection Regulation (EU GDPR) in Europe are more important than ever before.

White Paper | Presented by Neo4j

Create Business Value through Data Relationships

Where does sustainable competitive advantage come from? It's not from the volume of your data, but from the knowledge of relationships in your data. Learn how a graph database can help you identify new market opportunities and reimagine existing applications.

Load More