All White Papers

Resources available: 1338

Capacity Management via DCIM: Real-Time Data Center Intelligence Pays Off

Effective data center capacity planning must proactively manage rack space, power, cooling and network connectivity. To prevent data center resources from becoming inefficient over time, real-time intelligence is critical. A data-center infrastructure management (DCIM) tool must perform automated capacity...

Delivering enterprise information securely on Android and Apple iOS tablets and smartphones

Mobile devices like smartphones and tablets offer new mobility and flexibility for people and IT, but they also pose new challenges for information security and privacy. This white paper discusses the security implications and capabilities of the major mobile OS platforms, and presents comprehensive...

10 essential elements for a secure enterprise mobility strategy

Mobility can help your organization's workforce achieve new levels of productivity and agility. But to be successful, your enterprise mobility strategy must ensure protection and compliance for sensitive business information while providing the convenient user experience people demand. This white paper...

Security Leadership Series: Security Strategies for Success

Given an ever-expanding array of increasingly potent information security threats, today's highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. In this exclusive CSO Magazine eBook, it shares best practices for leading meaningful...

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager

New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. In response, the array of security technologies available has also grown....

State of Cloud Security Report

In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted,even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure...

Anatomy Of A CyberAttack

As the number and severity of cyber-crimes continues to grow, it's important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth

Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop with FlexCast allows you to use a variety of methods to balance user requirements and costs for each use case in your...

Infographic: Top Use Cases for Desktop Virtualization

A range of business issues are driving IT towards desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their workforces, one project at a time. See the trends driving the adoption of virtual desktops and the top use cases IT teams are deploying today.

IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment

IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and ability to push the client virtualization agenda for the rest of the industry". Download the MarketScape now.

©1994-2014 Infoworld, Inc.