Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...

White Paper | Presented by Cisco Systems

Demystifying SDN for the Network Engineer

Software-defined networking (SDN) can be a big change for network engineers, as it introduces a greater level of automation to networks. But this change can benefit your organization, through improved efficiency, accuracy, simplicity, and power. Get the full picture - download our "Demystifying SDN for the Network Engineer" white paper now.

White Paper | Presented by A10 Networks

The Ultimate Guide to SSL Inspection- Uncover Threats in SSL Traffic

Encrypted traffic accounts for a large and growing percentage of all network traffic. While the adoption of SSL, and its successor, Transport Layer Security (TLS), should be cause for celebration - as encryption improves confidentiality and message integrity - it also puts organizations at risk.

Video/Webcast | Presented by Netwrix

Beyond Perimeter: Detecting Ransomware and Aberrant User Behavior

The avalanche of recent WannaCry Ransomware attacks proves that cybercriminals have been successful in creating new techniques and deceptive tactics that easily outpace traditional perimeter security. Under these conditions, what is your security plan to detect the threats that are already inside? Join this webcast Thursday, June 22, 2017, 01:00 PM EDT to learn more.

Web and App Defense: Better Protection Through Better Visibility

Today's risk and security landscape is more volatile than ever for software and technology companies. IT security today is no longer about simply putting up a firewall and calling it done. Web application security is a priority for technology businesses as they depend on the internet and their websites for ongoing prevention, fast detection, and even faster remediation of known and unknown threats.

Exploring the Power of Optimal Mobile Performance

The rate of technology adoption by field service workers continues to accelerate and with it mobile data consumption. By 2020 mobile data usage is expected to grow nearly 9x globally. Enterprises large and small are seeing the benefit that mobile workforces can deliver. Are you prepared to accelerate your mobile experience?

White Paper | Presented by Uplogix, Inc.

Solution Guide: Out-of-Band Management for Network Function Virtualization (NFV)

As with traditional network architectures, NFV still faces some of the same challenges when it comes to reliance on the network itself for monitoring and managing the network infrastructure, rapid identification and resolution of network issues and ensuring secure access to, and logging for, network components.

10th Annual State of The Network Study

The Tenth Annual State of the Network Global Study focuses a lens on the network team's role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives.

APM for Security Forensics

The right Application Performance Management (APM) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) solutions.

Packet-Based Security Forensics

This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.

Viavi Special Report: Network Tools Hold Critical Insight in Attack Remediation

In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics.

Load More