Skip Links

Network World

Resource Library

  • Delivering enterprise information securely on Android and Apple iOS tablets and smartphones
    Source: Citrix
    White Paper: Mobile devices like smartphones and tablets offer new mobility and flexibility for people and IT, but they also pose new challenges for information security and privacy. This white paper discusses the security implications and capabilities of the major mobile OS platforms, and presents comprehensive technologies and best practices to ensure control and security without impairing productivity.
  • 10 essential elements for a secure enterprise mobility strategy
    Source: Citrix
    White Paper: Mobility can help your organization's workforce achieve new levels of productivity and agility. But to be successful, your enterprise mobility strategy must ensure protection and compliance for sensitive business information while providing the convenient user experience people demand. This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility.
  • Security Leadership Series: Security Strategies for Success
    Source: Citrix
    eBook: Given an ever-expanding array of increasingly potent information security threats, today's highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. In this exclusive CSO Magazine eBook, it shares best practices for leading meaningful security discussions with the board of directors, engaging users to protect business information, and meeting security-related compliance requirements.
  • The Ten "Must Haves" for Secure Enterprise Mobility
    Source: Citrix
    White Paper: While enterprise mobility brings opportunity for your users and organization, it also invites risk - with data breach and data leakage topping the list of concerns. This concern grows as an increasing number of smartphones and tablets not only connect to the corporate network but also access a wide variety of business applications and content repositories. Download this white paper for an enterprise-ready mobile security framework and a checklist for evaluating enterprise mobility vendors.
  • Navigating the New Wireless Landscape
    Source: Aerohive
    KnowledgeVault: Wireless LAN controllers are about to become obsolete-a fate sealed by the advent of 802.11ac. This KnowledgeVault is packed with informative short videos, webcasts and white papers that show how you can capitalize on this emerging trend.
  • The Benefits of Cloud Networking
    Source: Aerohive
    White Paper: Cloud networking introduces a new way to deploy, operate, & manage distributed enterprise networks. It delivers network capabilities via a cloud infrastructure with minimal capital investment or IT resources. This paper provides details on cloud networking, the state of the cloud market & its benefits
  • Infographic: Benefits of a Controller-less Networks
    Source: Aerohive
    KnowledgeVault: Controllers are on their last legs. A vestigial appendage of a by-gone era of Wi-Fi. This infographic illustrates why controllers need to go SOONER THAN LATER ...
  • Is your smartphone secure enough?
    Source: Samsung
    Research/Infographic: Today more than 79% of businesses worldwide have experienced mobile security breaches. Samsung provides three advanced security solutions with Samsung KNOX.

    Meet the future of secure Android. KNOX delivers the security needed for your enterprise's Samsung devices. From hardware to architecture to apps, multi-layered security ensures you enjoy the world's favorite mobile operating platform with the security standards your enterprise network demands.

    Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more.
  • Security? Leave it to Me! Samsung KNOX
    Source: Samsung
    Research/Infographic: Meet the future of secure Android. KNOX delivers the security needed for your enterprise's Samsung devices. From hardware to architecture to apps, multi-layered security ensures you enjoy the world's favorite mobile operating platform with the security standards your enterprise network demands.

    Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more.
  • Secure Mobility Myth Buster
    Source: Samsung
    White Paper: Enterprise Mobility Management (EMM) (managing mobile devices like tablets, notebooks, and smartphones) is dynamic and multi-faceted. Organizations seeking mobility solutions are faced with conflicting security paradigms and divergent architectures, with competing solutions from dozens of software suppliers and device vendors.

    As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing and conflicting myths instead of useful information to guide key evaluation and acquisition decisions.

    This document reviews the more common myths and misconceptions about secure mobility and EMM, and a sensible and enlightened debunking of each.
  • Think Your User Authentication is "Good Enough"? Think Again
    Source: SMS PASSCODE
    White Paper: Recent high-profile hacks have made it clear: user names and passwords do a terrible job of protecting data. In response, the market is flooded with multi-factor authentication solutions claiming that they've got what it takes to keep you secure. Use this step-by-step guide to avoid the common pitfalls when selecting an authentication solution.
  • Best Practices for Fending off Hackers in the Cloud
    Source: SMS PASSCODE
    White Paper: Cloud services have become massively popular, as organizations enable remote access to more and more applications stored offsite. With this spike in remote access comes a new challenge in ensuring security and compliance by authenticating the identities of users accessing that data.
  • Security and BYOE - 3 Best Practices You Need to Know
    Source: SMS PASSCODE
    White Paper: When today's hacker and identity theft threats combine with the new challenges presented by the trend of 'bring your own device' (BYOD), companies must take decisive action to deliver secure, flexible and convenient authentication to employees and their devices alike.
  • Modern Threats Demand a New Breed of User Authentication
    Source: SMS PASSCODE
    White Paper: Modern cyber threats have overtaken the trusted first generation two-factor authentication tokens. A new generation of more secure real-time multi-factor authentication solutions is needed.
  • Exchange & BYOD: Avoid Disaster, Plan for Success
    Source: Good Technology
    White Paper: Exchange ActiveSync (EAS) is the protocol underpinning many BYOD programs. However, if not properly managed, the combination can be disastrous with an increasingly diverse set of untested devices connecting and potentially degrading Exchange performance. Learn how careful planning, good operational processes as well as new techniques and tools can help organizations avoid these pitfalls and make BYOD work.

Results 1 - 15 of 1052