Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


VLAN Implementation Guide: The Basics

by Network Computing: Back to BasicsFeb 08, 2016

Virtual LANs are core to enterprise networking. This guide covers VLAN trunks, VLAN planning, and basic VLAN configuration.

If you're just getting started in the world of network administration and architecture, there's no better place to begin than with a solid understanding of virtual LANs (VLANs.)

8 Reasons IT Certifications Still Matter

by Network Computing: Back to BasicsFeb 08, 2016

Despite the issues associated with IT certifications, they can give you a leg up on the competition and advance your IT career.

ACL Implementation Guide

by Network Computing: Back to BasicsFeb 08, 2016

If you find yourself in a situation where you need to filter traffic somewhere on your network, then knowing how to configure access control lists (ACLs) is an essential skill to have. An IP ACL can be configured on a specific interface in order to permit/deny traffic based on IP address and/or TCP/UDP port(s).

In this guide, you will learn how access control lists work, the two most commonly used ACL types and how to configure an ACL. We will also show you how to edit ACLs and

Forrester Research: Make The Business Case For Mobile Insurance

by AkamaiFeb 01, 2016

Funding for mobile initiatives now depends on presenting compelling business cases. This report is part of Forrester's mobile insurance strategy playbook and serves as a how-to guide for justifying mobile insurance technology investments. Read the full report courtesy of Akamai.

Top 8 Considerations for Enabling Digital Transformation Within Financial Services

by AkamaiFeb 01, 2016

Financial services institutions (FSIs) need to embrace digital transformation. At the heart of that mandate is to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices.

Get started on your journey download the white paper today!

10 Best Practices for Delivering a Mobile Insurance Application

by AkamaiFeb 01, 2016

Delivering high-quality user experiences across different networks and devices is a challenge. Filing an insurance claim or making a policy change can be a stressful time. Give your customers the exceptional service they deserve on whatever channel they choose when interacting with you.

Digital Transformation, Millennials and the Future of Financial Services

by AkamaiFeb 01, 2016

Do you know Millennials (80 million strong) are projected to inherit at least $41 trillion by mid-century? How can your Financial Services business attract the next generation of customers?

Negotiating with Cybercriminals

by ThreatTrack SecurityJan 19, 2016

In weighing principle vs. negotiating with cybercriminals to recover stolen or encrypted data, 30% of U.S. security professionals have concluded that getting their data back is more important.

Ponemon Cost of Phishing and Value of Employee Training

by WombatJan 07, 2016

Wombat security education improves phishing defense by 64%, delivers 50x ROI according to independently-conducted Ponemon study.

Applying Threat Intelligence to the Star Wars' Battle of Yavin

by ThreatConnectDec 29, 2015

Cyber Jedis know that Star Wars provides a wealth of incidents worthy of study. In fact, the entire story of Episode IV: A New Hope centers around the response to and consequences of a data breach, culminating in the destruction of the Death Star. If the Empire had been able to make sense of the intelligence they were gathering and had been able to connect the dots to reveal contextual information, they could have prevented their own demise, and stopped a decades-long saga from unfolding.



Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud.

To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.

Network Computing: Back to Basics

Network Computing: Connecting The Infrastructure Community
The rise of virtualization, cloud computing, and mobility is causing immense changes inside and outside the data center. Different specialties and hardware systems are now converging onto one enterprise infrastructure system. At the same time, IT leaders have more options than ever for how to build infrastructure, how to deliver applications and services, and how to allocate budgets. In order to choose and implement the most efficient strategies and technology investments, IT leaders must be constantly learning, understand how to ask the right questions, and be able to explain infrastructure complexities in a manner that makes sense to their business environments.


Today, business depends on connectivity. But with connectivity comes vulnerability. It's chaos out there. Together, we will bring order. Founded by analysts fresh from the front lines of cyber defense, a visionary computer engineer and a successful business leader, ThreatConnect looks to take the vast potential of threat intelligence and make it accessible for Fortune 5000 organizations and allied government agencies around the globe. By building the only truly extensible platform in the industry and bringing together trusted communities of security professionals, we make every ThreatConnect user stronger and more agile to defend themselves.

ThreatTrack Security

Just detecting advanced malware is not enough. True cybersecurity comes in the ability to eradicate threats from your network and knowing with 100% confidence that your organization is malware-free. ThreatTrack Security offers a new breed of cybersecurity technology that includes real-time advanced malware detection and remediation. Our solutions detect the world's most sophisticated malware - including Advance Persistent Threats (APTs) and targeted attacks - and empower you to completely eliminate those threats from your network.


Wombat Security Technologies is a company born from research at the world-renowned Carnegie Mellon University (CMU). In June 2008 the company was founded by Drs. Lorrie Cranor, Jason Hong, and Norman Sadeh, all faculty members at the CMU School of Computer Science. While at CMU, our cofounders lead the largest national research project on combating phishing attacks. Their goal was to address the human element in cyber security and develop novel, more effective anti-phishing filtering solutions. This project, which was funded by the National Science Foundation and the Department of Defense, yielded a uniquely effective suite of cyber security software training and filtering technologies. These technologies provided the foundation for Wombat Security Technologies' line of products and continue to be refined and extended by our co-founders.