Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

...or search.
White Paper | Presented by Cisco Systems

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack

Methods that rely exclusively on detection and blocking to prevent cybercrime are no longer adequate. It's time for a new security model to address the full attack continuum - before, during, and after an attack.

White Paper | Presented by NetApp

Attributes of SAN Storage Required for Business Critical Workloads

This IDC white paper reviews the key SAN storage features required to meet such challenges and the NetApp SAN storage portfolio offerings that best address your needs.

White Paper | Presented by Cisco Systems

Buyer's Criteria for Advanced Malware Protection

Download Buying Criteria for Advanced Malware Protection for an up close look at what it really takes to effectively deal with advanced malware along with recommended guidelines for making advanced malware protection purchase decisions.

White Paper | Presented by Cisco Systems

Cisco 2014 Midyear Security Report: Identifying Weak Links

As the Internet of Things accelerates, adversaries will spend more time finding weak links across the threat landscape to compromise systems and data. Download the Cisco 2014 Midyear Security Report to learn about these threats.

White Paper | Presented by Cisco Systems

Cisco 2014 Midyear Security Report: Identifying Weak Links

And as the Internet of Things accelerates, so do opportunities for attackers. Download the Cisco 2014 Midyear Security Report to learn about vulnerabilities in the systems we rely upon and what can be done to reduce their number and impact.

White Paper | Presented by Cisco Systems

Cisco FireSIGHT Management Center: Context-Aware and Adaptive Security

If you don't have total visibility into everything on your network - physical and virtual hosts, operating systems, applications, services, protocols, users, content, network behavior- you're giving sophisticated attackers an advantage.

White Paper | Presented by NetApp

Enhancing Database Environments with NetApp Storage

Organizations of all kinds rely on their relational databases for both transaction processing and analytics, but many still have challenges in meeting their goals of high availability, security, and performance.

White Paper | Presented by NetApp

Enterprise Storage for Performance-driven Databases

IT managers and line-of-business stakeholders are striving to increase efficiency of their application environments.

White Paper | Presented by Cisco Systems

Five New Laws of Antimalware Protection: Keep Up with Evolving Threats

Download this report now to learn the 5 New Laws of Anti-Malware and how you can protect your networks from the newly-evolving threat landscape.

White Paper | Presented by NetApp

Hardware Optimized Storage for Business Critical Applications

Organizations today are increasingly information-driven, requiring them to create, organize, and store more data every day.

Load More