Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...

...or search.

A New Framework For Securing Enterprise SaaS

With corporate data now in the cloud, IT must be proactive about governing usage, securing data and protecting users wherever they are in real-time. In this webcast, learn about a new framework for securing SaaS applications.

White Paper | Presented by PC Connection

Planning for Windows Server 2003/R2 End of Support

The end of support for Windows Server 2003/R2 could signal the beginning of a new stage in your organization's evolution, and taking advantage of the Microsoft datacenter transformation vision can help you reach that next stage.

White Paper | Presented by LogMeIn

Re-Evaluating the Role of "Traditional" Audio Conferencing

This white paper discusses new audio trends in the workplace, as well as the criteria that companies should consider before selecting an audio conference provider.

Taking Control of the Digital and Mobile User Authentication Challenge

This asset examines the growing demands on authentication systems and the issues IT is struggling with to protect digital assets and retain control, while achieving the desired user experience.

White Paper | Presented by Wandera

The Evolution and Impact of Hidden Mobile Threats: Why your Organization Needs a Multi-Level Security Solution

We only hear about the high profile cyber attacks in the news, but what about the every day threats affecting your organization right now?

Deep Dive | Presented by Imperva

Prevent DNS-based DDoS Attacks

DNS-based distributed denial-of-service attacks are both alarmingly simple and extremely damaging. DNS expert Cricket Liu explains how these attacks work, how you can defend your network against them, and how you can prevent your DNS servers from being used to launch attacks on other networks.Security expert Cricket Liu lays out the workings of a DNS-based DDoS attack -- and how to prevent one from hitting your company

White Paper | Presented by Citrix Systems

10 essential elements for a secure enterprise mobility strategy

With enhanced mobility and work flexibility comes increased security risk. Explore the security implications and capabilities of the major mobile OS platforms and learn more about best practices to fortify security while supporting productivity.

White Paper | Presented by Citrix Systems

8 Steps to Fill the Mobile Enterprise Application Gap

While personal mobile devices are flooding the workplace, equally challenging is the influx of consumer-grade mobile apps. We call this the "enterprise app gap" and you need to know about the risks it brings to your organization.

White Paper | Presented by BMC Software

A Practical Guide to Understand and Benefit from the Consumerization of IT

This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations.

White Paper | Presented by Citrix Systems

Best Practices in Choosing, Implementing and Using MDM and EMM

Mobility and security specialists are carefully considering enetrprise mobility management solutions. In this report Garner takes a look at best practices for evaluating and selecting an EMM solution.

Load More