White Papers by Topic: Security

Resources available: 391

Mobile First: Securing Information Sprawl

Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps and content.

The Ten "Must Haves" for Secure Enterprise Mobility

While enterprise mobility brings opportunity for your users and organization, it also invites risk, with data breach and data leakage topping the list of concerns. Download this white paper for an enterprise-ready mobile security framework.

Security Leadership Series: Security Strategies for Success

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for IT security.

10 essential elements for a secure enterprise mobility strategy

Best practices for protecting sensitive business information while making people productive from anywhere.

Best Practices to Reduce WAN Costs by up to 40%

Download our whitepaper on best practices to reduce WAN costs while solving today's pressing IT problems.

Together at Last: BYOD and Solid Security

Read this whitepaper to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.

Managing Exchange in a Post-PC World

A successful mobile deployment using ActiveSync depends on giving users a reliable, stable sync experience. But if any of the many moving parts in the EAS data path fail or degrade, the experience will suffer.

10 Tips for Successful BYOD

No longer is BYOD a disconnected project with a handful of users... In fact, it's becoming an industry standard. BYOD can deliver improved user productivity, engagement and satisfaction, not to mention cost savings.

Security and BYOE - 3 Best Practices You Need to Know

When today's hacker and identity theft threats combine with the new challenges presented by the trend of BYOD, companies must take decisive action to deliver secure, flexible and convenient authentication to employees and their devices alike.

©1994-2014 Infoworld, Inc.