Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

...or search.
White Paper | Presented by Akamai

Gatepoint Research: Beyond the Firewall: Protection and Performance

This white paper will look at escalating attack concerns, how to address the challenges as well as looking at building a cloud-based defense strategy.

White Paper | Presented by Akamai

The Importance of Improving and Adapting Web Security

With so much depending on web site availability, Chief Security Officers are considering new ways to be cost-effectively proactive and vigilant. This paper looks at the challenges and options to web security deployment.

White Paper | Presented by Akamai

Web Security: Protecting The Heart Of Your Business

Understand the impact cyberattacks have on your business.

White Paper | Presented by Cisco Systems

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack

Methods that rely exclusively on detection and blocking to prevent cybercrime are no longer adequate. It's time for a new security model to address the full attack continuum - before, during, and after an attack.

White Paper | Presented by NetApp

Attributes of SAN Storage Required for Business Critical Workloads

This IDC white paper reviews the key SAN storage features required to meet such challenges and the NetApp SAN storage portfolio offerings that best address your needs.

White Paper | Presented by Cisco Systems

Buyer's Criteria for Advanced Malware Protection

Download Buying Criteria for Advanced Malware Protection for an up close look at what it really takes to effectively deal with advanced malware along with recommended guidelines for making advanced malware protection purchase decisions.

White Paper | Presented by Cisco Systems

Cisco 2014 Midyear Security Report: Identifying Weak Links

And as the Internet of Things accelerates, so do opportunities for attackers. Download the Cisco 2014 Midyear Security Report to learn about vulnerabilities in the systems we rely upon and what can be done to reduce their number and impact.

White Paper | Presented by Cisco Systems

Cisco 2014 Midyear Security Report: Identifying Weak Links

As the Internet of Things accelerates, adversaries will spend more time finding weak links across the threat landscape to compromise systems and data. Download the Cisco 2014 Midyear Security Report to learn about these threats.

White Paper | Presented by Cisco Systems

Cisco FireSIGHT Management Center: Context-Aware and Adaptive Security

If you don't have total visibility into everything on your network - physical and virtual hosts, operating systems, applications, services, protocols, users, content, network behavior- you're giving sophisticated attackers an advantage.

White Paper | Presented by NetApp

Enhancing Database Environments with NetApp Storage

Organizations of all kinds rely on their relational databases for both transaction processing and analytics, but many still have challenges in meeting their goals of high availability, security, and performance.

Load More