Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

eBook | Presented by Google

Security at Scale with Cloud Computing - A Minute in the Life of Google

How does Google protect itself successfully from multiple kinds of cyber attacks every day? Read this report to find out.

eBook | Presented by Extreme Networks

5 Essential Elements of the 80211ac Wave 2 Business Case

Fueled by big expectations for increased Wi-Fi performance, the excitement around Wave 2 of 802.11ac comes as no surprise. After reading this eBook, you will not only be the most knowledgeable voice in the room, you'll also be well equipped to justify your upgrade to the 802.11ac Wave 2 standard.

eBook | Presented by Extreme Networks

Find and Control Any Application in Your Enterprise Network

This eBook will explain how the ExtremeAnalytics Platform uses the industry's first flow-based technology to deliver unprecedented network application insights for every network environment - helping enterprises control what's on their network and prepare for future threats.

eBook | Presented by Veeam Software

Building a Converged Infrastructure that Just Won't Quit

Read to see how Veeam technology can maximize the performance of Cisco, Dell EMC, Hewlett Packard Enterprise and NetApp converged infrastructure platforms, and see how businesses can benefit from an integrated approach to application and data Availability. Learn what it means when Always-On truly means Always-On!

eBook | Presented by Comcast

The IT Innovator's Guide to Digital Transformation in Healthcare

The growth of healthcare-related technology now enables health providers to provide levels of service previously unheard of. Moving well beyond the traditional reactive approach to treating patients, doctors and other healthcare workers are using technology to predict health trends among populations and moving proactively to address issues before they occur.

eBook | Presented by Safebreach

Breach and Attack Simulation Primer

This brief overview provides a light description about Breach and Attack Simulation, and how it can continuously validate your security.

eBook | Presented by Ixia

Cloud Visibility for Dummies

As enterprise IT teams move on-premises data centers to virtualized, software-defined data centers and public clouds, they address these important questions: how can we ensure availability, reliability, and performance of our mission-critical applications? How do we get critical data to security, analytics, and monitoring tools?

eBook | Presented by One Identity

Identity Analytics - A more comprehensive defense in the battle to reduce risk and enhance security

Almost every company has instances of users who have inappropriate entitlements because they are improperly provisioned or because they change roles and the old permissions are not de-provisioned. There's a great deal of risk associated with inappropriate or excessive rights, and bad actors love to exploit this. IT security teams must take a more proactive stance to reduce identity-related risk. Now they can.

eBook | Presented by Ixia

Network Visibility for Dummies

To establish strong network security and enable your security solutions to perform as expected, you need to implement strong visibility solutions that provide access to all your network traffic and provide exactly the right data - in real-time.

eBook | Presented by Citrix Systems Inc

Enabling the Distributed Enterprise with SD-WAN Customer Stories

Discover how Citrix customers are redefining their distributed Enterprise networks with NetScaler SD-WAN.

Load More