Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...
CLEAR

White Paper | Presented by Verizon

A More Collaborative, Mobile Workface Experience

A modern business needs a modern communication solution; one that controls costs, enables mobility and helps increase productivity to drive a competitive edge.

Miscellaneous | Presented by Anexinet

[WEBINAR] 5 Key Steps to Disaster Recovery Nirvana

Join Anexinet Cloud Solutions Director Ned Bellavance as he discusses the five key steps to get you well on your way to Disaster Recovery Nirvana, including: • How disaster Recovery is more than just technology • Disaster Recovery Plan testing strategies • Affordable, robust hybrid DR solutions

Video/Webcast | Presented by Druva & AWS

Safeguard your Life Sciences Data with Druva and AWS

In 2018, analysts expect acquisitions to drive business decisions for many Healthcare and Life Sciences organizations. During a consolidation, you want to secure both business assets and intellectual property, and ensure that your data is securely backed up, as part of your overall data management plan.

White Paper | Presented by One Identity

Authentication Services Single Sign-on for SAP®

For many organizations, SAP® applications and services are mission-critical. However, SAP applications often must meet strict standards demanded by Regulatory compliance, internal controls and corporate best practices. Learn how One Identity™ Authentication Services Single Sign-on for SAP delivers true single sign-on for SAP enterprise-wide.

White Paper | Presented by One Identity

Securely Managing Your UNIX Environment

This white paper details those challenges and explains how they can be overcome with the right practices and the right tools, enabling you to enhance security, achieve compliance, and dramatically improve operational efficiency

White Paper | Presented by One Identity

Controlling and Managing Super user Access

Security and compliance are driving forces behind many IT initiatives. That makes controlling and managing privileged access a high priority for any IT team. Yet, as vital as it is to effectively manage privileged accounts, native tools and manual practices aren’t good enough in today’s complex heterogeneous environments

eBook | Presented by One Identity

IAM for the Real World – Privileged Account Management e-book

Read this white paper for essential information on the common security issues with privileged account management, and how you can minimize or eliminate them altogether.

White Paper | Presented by One Identity

Strategies for successfully managing privileged accounts

Privileged accounts and users with elevated access have unique requirements that often push management and governance beyond the reach of traditional methods for privileged account management (PAM).

White Paper | Presented by One Identity

The Low hanging fruit of IAM – three fundamental things you should be doing

This paper covers where to start (focus on your greatest need) and what three fundamental things you should do to simplify and accelerate achieving governance.

White Paper | Presented by One Identity

8 Best Practices for Identity and Access Management

Too often, IT is placed in the role of “gatekeeper” simply because only IT has the tools needed to manage identity. But with the right identity management tools in place, IT maintains the tools and infrastructure, and the business controls the actual identities.

Load More