Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

Case Study | Presented by LogRhythm

2018 Cybersecurity: Perceptions and Practices Benchmark Survey

Bremer Bank, headquartered in St. Paul, Minnesota, is a privately held, $11 billion regional financial services company. As a trusted provider of banking, wealth management, investment, trust, and insurance products and services, Bremer services customers throughout Minnesota, North Dakota and Wisconsin.

White Paper | Presented by Logi Analytics

2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? Many application teams don't realize that the features they embed and how they develop them have a lasting impact on revenue, customer retention, and competitive differentiation. We surveyed 500 application teams embedding analytics to find out what separates successful projects from failed ones.

eBook | Presented by Flexera Software

A Framework to Strengthen Open Source Security and Compliance

Organizations have benefited greatly by the use of and investment in Open Source Software. Improved build times and better quality code has led to more than 50% of applications made up of open source software. The management of these Open Source assets is still nascent. To help legal, security and development teams and leaders identify their existing gaps and direct future investment, Flexera developed a maturity model framework based on an analysis of our customers and the market.

White Paper | Presented by Micro Focus


Learn how Alfa-Bank, one of the largest Russian private banks, ensures 24x7 availability and service quality of vital online banking systems. The bank’s site averages 2,000 concurrent sessions with a high number of transactions per hour so it was a serious challenge to maintain service quality. See how they used Operations Bridge to provides 100% transparency to the business of vital online systems and deliver automated reporting in a single pane of glass.

White Paper | Presented by Micro Focus

Die Mobiliar

Learn how Die Mobiliar, a leading Swiss insurance company, has been able to ensure that its business applications are highly-available and performing reliably in order to meet their customers’ needs. See how they used Operations Bridge to gain a central, consolidated overview of their applications, connecting a total of twelve different IT monitoring platforms.

White Paper | Presented by BlackBerry

File Sharing and Collaboration Leads to Security Gaps in Financial Services Firms

Learn how secure content collaboration solutions can make the difference, and what to look for in a secure and efficient collaboration solution.

White Paper | Presented by BlackBerry

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

‘Bring Your Own Device’ is gaining momentum in today’s workplace, including BYOD for laptops, tablets and smartphones. Learn how you can control costs with a BYO program that doesn’t sacrifice security.

White Paper | Presented by Micro Focus

Market Guide for AIOps Platforms

Many IT operations teams are already using AI operations (AIOps) technologies that leverage big data and machine learning for IT operations monitoring. Now some IT operations are beginning to use AIOps platforms for IT service desk and automation as well. But how should you deploy these platforms, and when?

White Paper | Presented by Micro Focus

Putting the ‘O’ in DevOps

Digital transformation is changing the face of IT. IT now needs to help the business move at the speed of the digitally driven market by supporting continuous innovation while simultaneously running its own core business; maintaining stability, performance, compliance, and security; and controlling costs. DevOps is help speed application deployment but cause problems for operations.

White Paper | Presented by LogRhythm

SANS Reviews LogRhythm CloudAI for UEBA

As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.

Load More