Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Java, enterprise integration and open source Java.

Filter the library by ...

...or search.
white paper | Presented by Red Hat

Enterprise architects challenged to manage data explosion

Read this whitepaper to find out how Red Hat Storage Server can allow enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.

white paper | Presented by Red Hat

CIOs strive to harness Big Data while keeping an eye on the bottom line

Read this whitepaper to learn how Red Hat Storage Server allows CIOs to confidently support business growth, manage cost and risk, capitalize on emerging technologies, and drive future innovation across their organizations.

white paper | Presented by IBM

Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security

Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are they protecting that data? This eBook addresses three myths of big data security.

white paper | Presented by IBM

Magic Quadrant for Data Masking Technology

IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.

white paper | Presented by IBM

Best Practices for Securing Hadoop

Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security.

white paper | Presented by IBM

Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges

Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data.

video/webcast | Presented by Fortinet

What should I look for in a Next Generation Firewall? SANS Provides Guidance

With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute explains what enterprises look for when considering alternative NGFW solutions.

white paper | Presented by Fortinet

Who does NSS Labs "Recommend" for NGFW?

In 2012, NSS Labs found that most available NGFW solutions "fell short in performance and security effectiveness." In 2013 NSS Labs noted "marked improvement" and bestowed their "recommended" rating on 6 vendors. Click here to find out who they were.

video/webcast | Presented by Fortinet

Why Are Customers Really Deploying an NGFW?

It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final deployment.

video/webcast | Presented by IBM

Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar

This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make predictive analytics the basis for better operational decisions with IBM SPSS Modeler.

Load More