Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...
CLEAR

White Paper | Presented by IBM

5 Epic Fails in Data Security

Data security is on everyone’s mind these days, and for good reason. The number of successful data breaches is growing thanks to the increased attack surfaces created by more complex IT environments, widespread adoption of cloud services and the increasingly sophisticated nature of cyber criminals. This paper looks at five of the most prevalent – and avoidable – data security missteps organizations are making today, and how these “epic fails” open them up to potentially disastrous attacks.

5 Reasons Enterprises Need a New Application Access Model

The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access?

White Paper | Presented by ServiceNow Inc

5 signs you've outgrown email and checklists to close the books

This white paper examines the 5 signs your organization needs to move away from these manual processes to modern workflows to allow for a faster close with less risk and improved employee experience.

White Paper | Presented by ServiceNow Inc

An accounting executive's guide to a simpler month end

This white paper examines 5 best practices for improving the monthly close.

Back Office Speed Drives Growth at Hitachi Solutions with Microsoft Dynamics 365 and Adobe Sign

Hitachi Solutions seized on the opportunity to integrate Microsoft Dynamics 365 with the e-signature capabilities of Adobe Sign, part of Adobe Document Cloud. The solution accelerates sales contract workflows as much as 80% and cuts document processing times in half.

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN

While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network.

Miscellaneous | Presented by Open Text

Compliant Application Decommissioning Reducing Costs & Risks

More than ever, there is a need for FSIs to enhance and modernize their application infrastructure, but they face data integrity and compliance challenges due to legacy applications that contain valuable, regulated data and content. This extremely useful information must be retained, given new life providing new context, delivering additional value and enabling reuse. The legacy applications, which may be decades old, are a cost and a risk burden to the organization.

Cyber Resilient Security in 14th

As servers become more critical in a software-defined datacenter architecture, server security becomes the foundation of overall enterprise security. Servers must emphasize security at both the hardware and firmware level by leveraging an immutable Root-of-Trust that can be used to verify subsequent operations within the server. This establishes a chain of trust that extends throughout the server lifecycle, from deployment through maintenance to decommissioning. The 14th generation of PowerEdge servers deliver this chain of trust and combine it with comprehensive management tools to provide robust layers of security across hardware and firmware. Download this whitepaper from Dell EMC and Intel® to learn more.

Cyber Resilient Security in 14th

As servers become more critical in a software-defined datacenter architecture, server security becomes the foundation of overall enterprise security. Servers must emphasize security at both the hardware and firmware level by leveraging an immutable Root-of-Trust that can be used to verify subsequent operations within the server. This establishes a chain of trust that extends throughout the server lifecycle, from deployment through maintenance to decommissioning. The 14th generation of PowerEdge servers deliver this chain of trust and combine it with comprehensive management tools to provide robust layers of security across hardware and firmware. Download this whitepaper from Dell EMC and Intel® to learn more.

Digital, Mobile, and Seamless: How the Financial Industry Is Revamping Customer Experience

From a bird’s eye view, banks and financial service providers have been making incremental innovations over the last few decades. Significant successes have been rare. But finally, digital innovation is stirring things up in the financial sector, with customer experience taking centre stage.

Load More