All White Papers

Resources available: 1362

Anatomy Of A CyberAttack

As the number and severity of cyber-crimes continues to grow, it's important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth

Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop with FlexCast allows you to use a variety of methods to balance user requirements and costs for each use case in your...

Infographic: Top Use Cases for Desktop Virtualization

A range of business issues are driving IT towards desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their workforces, one project at a time. See the trends driving the adoption of virtual desktops and the top use cases IT teams are deploying today.

IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment

IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and ability to push the client virtualization agenda for the rest of the industry". Download the MarketScape now.

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce

Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.

SaaS Pro Tip: Move Your Data-driven Operations to the Cloud with this Platform

The "build vs buy" discussion just got a lot more interesting. Especially for those larger enterprise operations that, due to their size and complexity, still rely on archaic methods to capture and connect critical operating data to different areas of the business. Form.com offers the horsepower...

Compliance in the Cloud: SaaS Data Backup and Restore Get the Job Done

If you operate any kind of organization today, chances are good that you're required to comply with at least one of the many laws regulating how organizations manage information and data.Chances are also good that the regulations with which you must comply have to do specifically with information...

The Evolution of Corporate Cyberthreats

Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it's imperative to stay at...

Unlocking the Promise of Demand Sensing and Shaping through Big Data Analytics

Many organizations have limited insight into big data. These limitations have significant opportunity costs and can have a negative effect on identifying and understanding customer demand patterns and related supply constraints. This paper goes beyond basic demand-sensing and demand-shaping concepts and...

©1994-2014 Infoworld, Inc.