Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

33 Results Found

Results per page: 10 40 80

Cisco’s Intent-Based Networking and the Journey to Software-Defined Networks

White Paper | Dec. 07, 2018

The traditional network engineering model of configuring one device at a time simply doesn’t scale to the growing needs of today’s network. Cisco's intent-based networks and software-defined networking solutions will enable your organization to meet the demands of network programmability and automation. The result will be greater network agility to support new applications while complying with increasing security needs.

Cisco FabricPath: Is it Switching, Routing or a Bit of Both?

White Paper | Dec. 04, 2015

Learn how Cisco FabricPath combines the benefits of Layer 2 Switching and Layer 3 Routing, allowing for the scalability and flexibility of Layer 2 while supporting traditional Layer 3 components such as optimal paths, equal cost multipath routing and a Time to Live (TTL) field.

CCNAX Routing and Switching Boot Camp or ICND1 and ICND2: Which Path Is Best for You?

White Paper | Dec. 02, 2015

What path you decide to take to earn your Cisco Certified Network Associate (CCNA) Routing and Switching certification will depend on a number of factors including your availability, willingness to work long hours and your ability to absorb a lot of information in a short period of time. This white paper includes self-assessments and training recommendations to help you figure out if taking the CCNAX Routing and Switching Boot Camp or taking two separate ICND1 and ICND2 courses is the best fit for you.

Understanding Cisco Security Solutions: Are You Ready for a New Era of Risk?

White Paper | Oct. 06, 2015

The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.

Cisco Unified Collaboration Solutions Infrastructure Overview

White Paper | Sep. 25, 2015

The Cisco Unified Collaboration solutions offer anytime, anywhere access for organizations who need instant access to clients, vendors and remote employees. Cisco products enable authorized external users to connect to corporate resources, create different user groups and manage large scale deployments. Learn how Cisco Unified Collaboration infrastructure products can help you provide everything from call control which provides signaling and dial plan support to the expressway series providing firewall traversal for external access.

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.

Cisco Collaboration Endpoints

White Paper | Sep. 17, 2015

Your clients, vendors and workforce don't always operate in the same building, state or country. Cisco Collaboration Endpoint products make communicating with your counterparts across town or on the other side of the world easy. This white paper provides you with product specifications and capabilities for Cisco's phone, desktop, and large screen immersive videoconferencing options.

Data Breaches: What Can and Cannot Be Done

White Paper | Aug. 23, 2015

Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability

White Paper | Aug. 14, 2015

Discover why healthcare organizations must take an immediate active role in securing their data. It is much more costly, monetarily as well as with regard to reputation, for an organization to react to a breach rather than plan for it.

Cisco Completes the Security Picture with Sourcefire

White Paper | June 19, 2015

Security attacks have become more advanced; therefore, security solutions have needed to evolve to deal with those threats. Cisco's acquisition of Sourcefire brings a new paradigm to the security landscape. No longer is security a one-time, instantaneous event. Security now is threat based, network cognizant, and continuous. All organizations, public and private, need to be aware not only of the constantly changing threat environment, but must be prepared to respond in kind.