ONUG RESOURCE LIBRARY

The ONUG Resource Library is the number 1 place for education and actionable resources and solutions to Enterprise Multi-Cloud security, observability, networking and automation. Browse to find information from our trusted partners, Collaborative Working Groups, and industry thought leaders. Sign into your free ONUG account for free access to all of our knowledge-filled resources.


On Demand Videos & Downloadable Content


Sort by:

AI Networking Summit Security Syllabus

December 4, 2024
Attended the 2024 AI Networking Summit in Chelsea, NYC? Use this comprehensive Security syllabus to track and submit your training credits towards your existing certifications.

AI Networking Summit Networking Syllabus

December 2, 2024
Attended the 2024 AI Networking Summit in Chelsea, NYC? Use this comprehensive syllabus to track and submit your training credits towards existing certifications.

Evaluating AI In Networking? What You Need To Know

October 4, 2024
Learn about Aviz, analysts take on AI networking, AI for networks, ROI based strategy and evolution of AI, evaluation criteria. Watch the webinar.

The Zero Networks Platform – Automated, Agentless Segmentation of Networks and Identities with Secure Remote Access

October 2, 2024
This Technical Validation from TechTarget’s Enterprise Strategy Group outlines the evaluation of the Zero Networks identity and network security platform. We validated how Zero Networks simplifies effective network segmentation, identity segmentation, and secure remote access.

Microsegmentation Buyers Guide

October 2, 2024
This guide is designed for cybersecurity leaders seeking to strengthen their defenses against ransomware and lateral movement through microsegmentation. It explores the importance of preventing lateral movement, explains why traditional solutions fall short, and outlines key features to look for in effective microsegmentation tools.

Why Managing Cloud Entitlements Is Nearly Impossible… And How To Do It

April 1, 2024
Driven by a need to respond with greater speed to new market opportunities and competitive pressures, the accelerated pace of digital transformation with cloud has placed unprecedented pressure on already overburdened security teams.

Financial Services – Securing Identities in Your Cloud Infrastructure

April 1, 2024
Financial organizations are adopting the cloud at a rapid pace. A robust cloud security solution for securing identities will ensure you reap the benefits.

The Importance of IGA and CIEM In Security and Governing Cloud Identities

April 1, 2024
Identity Governance and Administration (IGA) tools track and control user access in on-premises and cloud-based systems. Cloud Identity Entitlement Management (CIEM) solutions provide fine-grained, multi-cloud visibility and dynamic context for identity governance in the cloud.

Holistic Cybersecurity Top Ten List

September 13, 2022
Stressed out by 100s of Cybersecurity actions that change daily? Here’s the Holistic Cybersecurity Top Ten List - a one-page playbook of prioritized actions to get you started and on the path to sanity!

Edge Computing Enterprise Brief

April 18, 2022
The rise of cloud computing has transformed how businesses operate IT infrastructure and how businesses and consumers alike interact with applications. As part of the evolution of cloud infrastructure, and accelerated by...

Private Mobile Networks Enterprise Brief

March 30, 2022
For busy business and technology executives, we highlight key trends and important insights to help you understand their relevance and provide...

See It, Fix It, Manage It: Ensuring Hybrid and Multicloud Applications Are Reliable and Secure

March 22, 2022
A Pathfinder paper navigates decision-makers through the issues surrounding a specific...

Solving the BIG problems in cloud computing

March 22, 2022
The benefits of cloud computing are clear, from access to new technology, to flexibility in scaling resources at peak times...

The Power of Visibility: How a Network Digital Twin Drives Agility, Security, and Availability

March 22, 2022
The IT pendulum is swinging towards highly distributed, modern environments.

Siloed and Poorly Integrated Systems Continue to Undermine Network Security

March 22, 2022
Constrained by tight budgets and staffing shortages, IT managers are constantly striving...

Why Network Verification Requires a Mathematical Model

March 22, 2022
In this paper, we will describe how verification can be used in key IT processes and workflows, why a mathematical model is required...

Tunnel-Based versus Tunnel-Free SD-WAN

March 22, 2022
With the emerging need to connect users to clouds, traditional WAN connectivity using leased lines and MPLS is falling short.

Hybrid Cloud Economics

March 22, 2022
In this comprehensive study, our key findings are that applications with high data transfer requirements and/or GPU compute requirements are much more expensive to run on a public cloud versus a private cloud, and applications with less...

Segment Routing Research Paper

March 22, 2022
The versatility of segment routing in terms of deployment, distributed versus centralized, network types, data centers/WANs/access, and use cases make it a solid option for end-to-end network deployment.

The Economic Benefits of the Dell Technologies Bare Metal Orchestrator

March 22, 2022
Communication Service Providers CSPs are going through a major paradigm shift.