Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...

2018 Trends in SD-WAN

Today, most WAN traffic, to and from branch and remote sites, is destined for the cloud, either to SaaS services or applications hosted in an IaaS environment. The traditional WAN was architected for branch-to-data-center traffic flows, not to efficiently support new cloud-driven traffic patterns.

Architecting an Application-Driven WAN Edge

As organizations continue to adopt Software-as-a-Service (SaaS) applications and cloud infrastructure (IaaS), exploding traffic levels and changing traffic patterns are prompting enterprises to reevaluate their Wide Area Networks (WANs). In virtually every market segment, applications are moving to the cloud and a decreasing number are hosted on-premise in the data center.

White Paper | Presented by PTC

Evaluating and Choosing an IoT Platform

As the Internet of Things (IoT) continues to saturate the world of business and consumer-facing applications, it is all too easy for rational decisions about its adoption to be complicated by the latest bells, whistles, and trends. Every business is determined to be current, or even better, aligned with the future of its industry ecosystem.

White Paper | Presented by PTC

Foundational Elements of an IoT Solution

The Internet of Things (IoT) has a rich technological legacy and a bright future: ubiquitous connectivity has created a new paradigm, and the closed, static, and bounded systems of the past will soon be obsolete. With the connection of low-cost sensors to cloud platforms, it's now possible to track, analyze, and respond to operational data at scale.

Gartner WAN Edge Competitive Landscape Report

The enterprise WAN edge has become the focus of new architectural approaches, in addition to functional consolidation, which has attracted more than 40 competitors. Technology product management leaders will be challenged as solution evolution will take multiple paths.

White Paper | Presented by Iron Mountain

Keeping Compliant: The Benefits of a Formal IT Asset Disposition Policy

As the data threat landscape continues to evolve and regulations compound, it's likely that having an ITAD policy will continue to increase in importance. For those companies that are operating without one or are disposing of IT assets on a piecemeal basis, the risks to the business will also increase.

Miercom Puts Silver Peak SD-WAN to the Test

When put in a rigorous test environment by Miercom, a leading independent assessment group, Unity EdgeConnect delivers superior application performance, even across consumer-grade broadband services and during severely degraded conditions or outages.

White Paper | Presented by PTC

Scaling Data Science for the Industrial IoT

Few aspects of computing are as much in demand as data science. It underlies cybersecurity and spam prevention, determines how we are treated as consumers by everyone from news sites to financial institutions, and is now part of everyday reality through the Internet of Things (IoT). The IoT places higher demands on data science because of the new heights to which it takes the familiar "V's" of big data (volume, velocity, and variety).

White Paper | Presented by Google

Google Endpoint Security Research Brief

In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records. Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device. Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.

Zero Trust Security: A New Paradigm for a Changing World

The Centrify Zero Trust Security model assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. Zero Trust Security requires powerful identity services to secure every user's access to apps and infrastructure.

Load More