Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

White Paper | Presented by PerimeterX

Six Major Threats to E-commerce and How to Stop Them

Automated bot attacks are becoming increasingly sophisticated as they learn how to avoid detection.

White Paper | Presented by SAP

The Rise of Unified Data and Analytic Platforms - The Case for Convergence

This EMA white paper provides initial guidance on how SAP Data Warehouse Cloud aligns with market and customer expectations through empowering business professionals with insight-driven decisions.

The Total Economic Impact™ Of Sierra Wireless Octave

Sierra Wireless’ Octave platform provides a fully integrated device-to-cloud solution that enables companies to monitor their IoT enabled connected assets by securely extracting, orchestrating, and acting on data from these edge-based assets and conveying relevant data to the cloud.

Video/Webcast | Presented by Expanse

Know Your Cloud Footprint with Expanse

As more organizations adopt the cloud in a variety of different forms, risk of uncontrolled spending and security exposures increases astronomically. Issues like shadow IT and orphaned cloud services are new and unique, making it challenging for IT and security professionals to address without proven technology and processes. Existing IT management tools have not evolved sufficiently to provide even the most fundamental component, a system of record of an organization's cloud assets.

White Paper | Presented by Dragos

Improving OT Defense and Response with Consequence-Driven ICS Cybersecurity Scoping

This paper will introduce an easily applied and repeatable scoping model that will help ICS security analysts identify starting points for cyber threat hunts, incident response planning, penetration/vulnerability assessments, and other related cybersecurity strategies.

White Paper | Presented by IBM

2019 Nucleus Research Guidebook

Companies are outsourcing cyber security infrastructure and expertise as budget and talent limit the abilities of IT departments. Nucleus found that the SIEM capabilities of IBM QRadar on Cloud (QRoC) helped customers realize value and maintain agility as their security and business needs change.

Miscellaneous | Presented by ARM Ltd

AI Today, AI Tomorrow: The Arm 2020 Global AI Survey

Not all AI devices are created equal. Some need only a small amount of data to perform useful tasks – others need to know everything about us. So, what makes people comfortable with one AI use case and uncomfortable with another? And how flexible is the line between them?

White Paper | Presented by IBM

Artificial Intelligence and Cybersecurity For Dummies, IBM Limited Edition

Both AI and cybersecurity are broad and poorly understood fields. This book helps give you an overview of the various technologies that make up AI, where they have come from, and what AI has evolved into today.

Miscellaneous | Presented by IBM

A Tale of Two SIEMS

The difference between operating in the best of times and worst of times is choosing the right SIEM. Keeping pace with advanced threats on a legacy SIEM can usher in an age of uncertainty for your corporate security. Operate in an age of wisdom with IBM Security QRadar, an intelligent, next-gen SIEM platform that takes the fight directly to threats.

Case Study | Presented by Centercode Inc

Centercode & Tableau Case Study

Tableau leverages Centercode to increase beta team productivity by 100%.

Load More
Popular Resources