Skip Links

Network World

Resource Library

  • Backup and Disaster Recovery
    Source: Zenith Infotech Ltd.
    Special report:Establish a disaster recovery plan that lets you sleep at night. Get the latest disaster recovery tips and technologies in this Executive Guide today.
  • Product Guide: IT Roadmap to Storage Virtualization
    Source: HP
    Special report:Review this Network World Guide and get the facts on Storage Virtualization including, market trends, buying tips, best practices, reviews and product comparisons. Read this information packed guide today.
  • Storage Resource Management
    Source: HP
    Special report:Read this informative Network World guide to understand how SRM works, buying tips, tests, reviews and much more.
  • Gartner 2009 Magic Quadrant for Job Scheduling
    Source: BMC Software
    Special report:Gartner has positioned BMC CONTROL-M in the Leaders Quadrant of their "2009 Magic Quadrant for Job Scheduling." The report assesses the ability to execute and completeness of vision of key vendors in the marketplace. Read a full copy today, courtesy of BMC Software.
  • Governance and Risk Management: The New Security Reality
    Source: Qwest
    Special report:Learn how to fight social engineering attacks while complying with federal regulations. Security pros describe their breeches and where they are now
  • Keeping Up - and Keeping Secure - With Access Control
    Source: Juniper Networks
    Special report:Today's distributed enterprises need an access control system that can keep up with the shifting demands that come with mobility and anywhere, anytime access. Get help with access control requirements from industry leader Juniper Networks in this exclusive special briefing.
  • IT Management is Broken. What's Next?
    Source: Splunk
    Special report:According to Forrester, organizations spent $1.5 trillion globally managing IT last year. 75% of this was spent on silos, legacy systems that still don't get answers to the most important questions: troubleshooting outages, investigating security incidents, and demonstrating compliance. Learn about the innovative software product forward-thinking organizations are using to dramatically improve their productivity and change the way they manage and secure IT.
  • Defending Against the Insider Threat
    Source: Juniper Networks
    Special report:Figures vary on the prevalence of "insider" attacks on corporate IT systems, but there's no debating that insiders have the ability to inflict tremendous damage, willfully or not. Read this Special Briefing to find out how you can thwart would-be attackers, and see how other organizations are doing the same.

Results 1-8 of 8