All White Papers

Resources available: 1075

Designing a defense for mobile apps

Mobile apps may be a threat, but they don't have to be. Download this whitepaper to review the various considerations for defending mobile applications-from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.

Infographic: HP Global 2000 Mobile Risk Report

Do you trust your mobile applications? Insecure mobile applications represent a real security threat to enterprises and individuals. HP Security Research leveraged HP Fortify on Demand Mobile to scan more than 2,000 mobile applications from more than 600 companies to find out. Download this info-graphic to...

HP Global 2000 Mobile Risk Report

Mobile applications represent a growing threat to the enterprise. But how big of a threat? HP Security Research leveraged HP Fortify on Demand Mobile to scan more than 2,000 mobile applications from more than 600 companies to find out.

Benchmark Report: Mobile App Performance

2014 will continue to be a huge year for mobile as businesses sharpen their focus from web to mobile and leverage apps to increase revenue and productivity. Improving mobile app performance is critical in order to ensure success. This first-ever mobile experience benchmark report offers real-world data on...

Protecting Digitalized Assets in Healthcare

Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.The pressure, therefore, is on healthcare IT to enable doctors and...

Is a SaaS Deployment Right for You?

Find out the answer and as well as the other deployment options.

Discover How Mail Express Solves 2 of Your Biggest IT Headaches

Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!Get all the answers...

File Security Evolution: From 5 Years Ago to Today (with a Hint at Tomorrow)

This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security.

Data on the Move = Business on the Move; How Strategic Secure Managed File Transfer Adds Value and Drives Business

This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files, the right managed file transfer (MFT) solution can allow such transfers to continue without...

Maximizing Uptime for Mission-Critical File Transfers: Availability and Scalability for Managed File Transfer

This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are...

©1994-2014 Infoworld, Inc.