White Papers by Topic: Security

Resources available: 198

Automation is Acceleration: Discover the World's Most Powerful DevOps Process Automation Platform

ElectricCommander gives distributed teams shared control and visibility into infrastructure, tool chains and processes to enable agility, predictability and security across many build-test-deploy pipelines.

Mobile First: Securing Information Sprawl

Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps and content.

Mobile Policy Checklist

Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

Regain control and reduce risk without sacrificing business productivity and growth

Delivering enterprise information securely on Android and Apple iOS tablets and smartphones

This white paper discusses the security implications and capabilities of the major mobile OS platforms, and presents comprehensive technologies and best practices to ensure control and security without impairing productivity.

Securing BYOD

Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are responding to the capabilities and flexibility that mobile devices provide.

Who's Spying on You?

You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments

The Threat Landscape

Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?

Be the One Who Puts Security on the Agenda eBook

You want to maximize the potential offered by new technologies and establish an advantage over your competitors. But you know the latest IT developments can also bring new security challenges.

Virtualization Best Practices Guide

Whether you're running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk.

©1994-2014 Infoworld, Inc.