Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

Unlock the 7 Key Steps to a Successful Cloud Migration

If you're like most enterprises, you've already dipped your toe into the cloud. Those who have moved some of their applications and infrastructure to the cloud far outnumber both the early adopters who went "all-in" and those who are still hesitating on the sideline. In a similar way, cloud migrations don't have to be all-or-nothing. In fact, they very rarely are.

Data Sheet | Presented by Radware

Zero-Day Malware Protection for the Enterprise Network

This data sheet outlines all the service features of Radware Cloud Malware Protection.

White Paper | Presented by Connection

A Secure Way to a Digital Future

By 2020, 60% of enterprises will be implementing a full-scale digital strategy. The problem is today, 60% of enterprises are at a "digital impasse." Download this Tech Dossier from Connection to learn how Microsoft 365 can break that logjam and help you accelerate toward your organization's digital future.

Eliminate Workload Automation Guess Work with Machine Learning

Join leading IT analyst firm Enterprise Management Associates (EMA) and Digitate for a webinar that will leverage highlights from EMA research and discuss the impact of machine learning on managing workload automation.

White Paper | Presented by Viavi

EMA - Comprehensive Cloud and Hybrid IT Monitoring Strategy

As enterprises become more distributed, leveraging the benefits of cloud applications and virtualization, network performance monitoring needs change. This paper explains active test monitoring, how it complements packet-based monitoring and three common visibility challenges that can be addressed with active testing.

White Paper | Presented by Viavi

Source Data for Network Security Investigations

It's not enough to focus on network security prevention and detection. Organizations must improve their ability to identify and address a security breach. This paper identifies three ways to reduce the impact of a network breach, the data and tools needed and what data will stand up in court.

White Paper | Presented by ServiceNow Inc

Special Report: Decision Automation

Artificial intelligence and machine learning can yield game-changing solutions for enterprises. Here's what senior IT leaders need to know to launch and maintain a successful machine learning strategy.

White Paper | Presented by Viavi

Troubleshooting OSI Layers 4-7

In this two-part white paper series, learn to quickly locate and resolve problems across the OSI layers using the Troubleshooting Cheat Sheet. The root cause of application anomalies don't stop at Layer 3 of the Open Systems Interconnection (OSI) model. In fact, some of the most difficult to diagnose service issues are rooted in, or manifest themselves at the Transport Layer (Layer 4) or higher.

White Paper | Presented by Viavi

Viavi Solutions Observer GigaStor 288T

Rapid increase in network traffic volumes (including the move to 40Gbe), security threats, and application complexity all underscore the importance for lossless data capture, analysis, and storage to provide crucial raw data for post event analyst and remediation.

eBook | Presented by Extreme Networks

5 Essential Elements of the 80211ac Wave 2 Business Case

Fueled by big expectations for increased Wi-Fi performance, the excitement around Wave 2 of 802.11ac comes as no surprise. After reading this eBook, you will not only be the most knowledgeable voice in the room, you'll also be well equipped to justify your upgrade to the 802.11ac Wave 2 standard.

Load More