Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Nutanix

Evaluating & Justifying Disruptive Technology

This webinar will assist CIOs, CTOs, CFOs, and anyone else interested in how to use financial analysis as a framework to optimize strategic decision-making. Attend and receive a free copy of the eBook “The ROI Story: A Guide for IT Leaders.

Video/Webcast | Presented by Nutanix

Virtualization in the Multi-Cloud Era

IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyperconverged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter, but choosing the wrong HCI platform could limit options in how you operate your datacenter or could impede cloud goals—including those associated with virtualization

Miscellaneous | Presented by Nutanix

Modernizing Your IT Infrastructure with IBM Power and Nutanix

This webinar will show IT directors and SysAdmins how the agility and simplicity of a cloud infrastructure can cut installation and operational time by 50% and be easily added to an IBM Power architecture by running Nutanix software.

White Paper | Presented by Nutanix

Nutanix Flow Solution Brief

The network is the foundation for the connected Enterprise. With increasing application complexity, driven by distributed services and rapid growth in SaaS and cloud-based offerings, the need to easily visualize, analyze and govern network communications becomes critical. Nutanix Flow delivers advanced networking and security services, providing visibility into the virtual network, application-centric protection from network threats and automation of common networking operations.

Miscellaneous | Presented by Nutanix

Nutanix Flow: Application Security and Network Microsegmentation

In this session, join Mike Wronski from the Nutanix product team to learn more about how the concepts and principals of application-centric network security combined with microsegmentation can be applied to network and application security.