Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...
CLEAR

White Paper | Presented by ReliaQuest

Four Proven Steps to Integrating Threat Intelligence for Higher-Fidelity Detection & Response

When integrated across security controls, threat intelligence allows security teams to increase detection rates, speed response times, and mitigate their most serious risks.

Isolation Best Practices for Financial Services Institutions

It’s time to abandon the detection approach used by traditional security solutions. A new approach is needed, and that new approach is Internet isolation.

White Paper | Presented by ReliaQuest

Securing the Cloud: How to Increase Cloud Visibility to Power New Business Opportunities

In order to properly secure the cloud to enable new business opportunities, you must begin by increasing cloud visibility.

White Paper | Presented by Iron Mountain

Striking the Right Balance Between Tape and Cloud

Worldwide data creation is expected to grow to 175 zettabytes by 2025, according to a study by IDC — an astounding 61% compounded annual growth rate from 2019. Approximately 80% of this data will become inactive legacy data that is never accessed or used again. However, this data must be kept available and accessible due to ever-changing regulations that require organizations to retain data anywhere from four years to forever.

White Paper | Presented by Iron Mountain

Striking the Right Balance Between Tape and Cloud

Worldwide data creation is expected to grow to 175 zettabytes by 2025, according to a study by IDC — an astounding 61% compounded annual growth rate from 2019. Approximately 80% of this data will become inactive legacy data that is never accessed or used again. However, this data must be kept available and accessible due to ever-changing regulations that require organizations to retain data anywhere from four years to forever.

White Paper | Presented by ReliaQuest

The CISO’s Guide to Metrics that Matter in 2020: How to Apply Metrics to Strengthen Security Programs and Articulate Value to Leadership

By applying the security metrics that matter, CISOs can mature their security programs and articulate value to leadership.

White Paper | Presented by SolarWinds

Zero to Hero — 12 Essential Tips for the Accidental DBA

This quick read will get you going in the right direction in less than 30 minutes. In this whitepaper, you'll learn 12 essential tips for working with SQL Server.

Building Resilient Manufacturing Operations Through Asset Management and IoT

The manufacturing environment is changing faster than ever before.

Enabling a Human-centric Customer Experience

Learn how Hero Digital, working with Adobe, has been able to drive meaningful improvements.

Adopt Agile, Scale and Transform: Evolve your Agile Transformation Journey

Download this whitepaper to not only learn the 3 stages of Agile adoption, their outcomes and limitations, but also to evolve your organizational structures and processes for true enterprise agility.

Load More