UBM: TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

VLAN Implementation Guide: The Basics

by Network Computing: Back to BasicsFeb 08, 2016

Virtual LANs are core to enterprise networking. This guide covers VLAN trunks, VLAN planning, and basic VLAN configuration.

If you're just getting started in the world of network administration and architecture, there's no better place to begin than with a solid understanding of virtual LANs (VLANs.)

  • Network Computing: Back to Basics
  • Infrastructure
  • Networking
  • Details

8 Reasons IT Certifications Still Matter

by Network Computing: Back to BasicsFeb 08, 2016

Despite the issues associated with IT certifications, they can give you a leg up on the competition and advance your IT career.

  • Network Computing: Back to Basics
  • Infrastructure
  • Networking
  • Careers
  • IT Strategy
  • Details

ACL Implementation Guide

by Network Computing: Back to BasicsFeb 08, 2016

If you find yourself in a situation where you need to filter traffic somewhere on your network, then knowing how to configure access control lists (ACLs) is an essential skill to have. An IP ACL can be configured on a specific interface in order to permit/deny traffic based on IP address and/or TCP/UDP port(s).

In this guide, you will learn how access control lists work, the two most commonly used ACL types and how to configure an ACL. We will also show you how to edit ACLs and

  • Network Computing: Back to Basics
  • Networking
  • Infrastructure
  • Details

CrowdStrike Global Threat Intelligence Report

by CrowdStrikeFeb 04, 2016

The 2015 CrowdStrike Global Threat Report highlights that today's threats, more than ever before, are driven by geopolitical and economic events around the world. In this complex threat environment, it takes people, processes, technology AND intelligence. Intelligence is no longer a "nice-to-have"-it is a mandatory element of stopping breaches. Read this new Global Threat Report to learn about the top threat actors, attack vectors, and threat intelligence trends to help you defend your

  • CrowdStrike
  • Security
  • Security Management & Analytics
  • Details

Future-proof and scalable web services

by HGSTFeb 03, 2016

Due to the rapid growth of online services, such as sales channel incentives, customer loyalty programs and charity fundraisers, Grass Roots had outgrown their 3-year old Storage Area Network (SAN). With a continuously increasing volume of online business, the company needed a way to scale efficiently without having to purchase more performance and capacity than is needed in the near-term. Read more to find out how Grass Roots overcomes these challenges.

  • HGST
  • Big Data
  • Hardware/Architectures
  • Details

Replacing Antivirus, and Doing it Right: A CISO Perspective

by SentinelOneFeb 01, 2016

As cyber threats grow in diversity and sophistication, AV-based protection offers less and less effective protection for organizations, creating a pressing need to replace existing signature-based endpoint protection software with a more advanced solution. Download this paper to get a seasoned CISO's perspective on the limitations of AV-based protection, and learn some best practices on how to plan and execute an organization-wide AV replacement project.

  • SentinelOne
  • Endpoint Security
  • Security platforms
  • Details

Forrester Research: Make The Business Case For Mobile Insurance

by AkamaiFeb 01, 2016

Funding for mobile initiatives now depends on presenting compelling business cases. This report is part of Forrester's mobile insurance strategy playbook and serves as a how-to guide for justifying mobile insurance technology investments. Read the full report courtesy of Akamai.

  • Akamai
  • Management Strategies
  • Financial Information Services
  • Details

Top 8 Considerations for Enabling Digital Transformation Within Financial Services

by AkamaiFeb 01, 2016

Financial services institutions (FSIs) need to embrace digital transformation. At the heart of that mandate is to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices.

Get started on your journey download the white paper today!

  • Akamai
  • Financial Information Services
  • Management
  • Details

10 Best Practices for Delivering a Mobile Insurance Application

by AkamaiFeb 01, 2016

Delivering high-quality user experiences across different networks and devices is a challenge. Filing an insurance claim or making a policy change can be a stressful time. Give your customers the exceptional service they deserve on whatever channel they choose when interacting with you.

  • Akamai
  • Management Strategies
  • Management
  • Details

Digital Transformation, Millennials and the Future of Financial Services

by AkamaiFeb 01, 2016

Do you know Millennials (80 million strong) are projected to inherit at least $41 trillion by mid-century? How can your Financial Services business attract the next generation of customers?

  • Akamai
  • Financial Information Services
  • Management Strategies
  • Details