White Papers by Topic: Security

Resources available: 306

5 Ways Dropbox for Business Keeps Your Data Protected

Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how we've built Dropbox for Business to keep data safe for all our users.

The Keys to Securing Data in a Collaborative Workplace

Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?

Best practices in choosing and implementing EMM

Mobility and security specialists are carefully considering enterprise mobility management solutions. In this report Gartner takes a look at best practices for evaluating and selecting an EMM solution.

10 Essential Elements for a Secure Enterprise Mobility Strategy

Best practices for protecting sensitive business information while making people productive from anywhere.

Enterprise mobility management at your own pace: a three-phase approach

This white paper presents a three-phase plan for mobile empowerment, management and security using the Citrix XenMobile EMM platform.

Mobile Device Management Policy Best Practices

This white paper explores ten policy best-practices for secure and compliant enterprise mobility.

The ABCs of Mobile Device Management

Check out our "ABC's of Mobile Device Management" e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!

Mobile Data Security: Finding the Balance

Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.

Protect Your Company, Read the "Internet Threats Trend Report"

Empower your company to defend its critical information assets with CYREN's Internet Threats Trend Report, which includes actionable data about new threat activity.

©1994-2014 Infoworld, Inc.