Skip Links

Network World

Resource Library

  • Delivering enterprise information securely on Android and Apple iOS tablets and smartphones
    Source: Citrix
    White Paper: Mobile devices like smartphones and tablets offer new mobility and flexibility for people and IT, but they also pose new challenges for information security and privacy. This white paper discusses the security implications and capabilities of the major mobile OS platforms, and presents comprehensive technologies and best practices to ensure control and security without impairing productivity.
  • 10 essential elements for a secure enterprise mobility strategy
    Source: Citrix
    White Paper: Mobility can help your organization's workforce achieve new levels of productivity and agility. But to be successful, your enterprise mobility strategy must ensure protection and compliance for sensitive business information while providing the convenient user experience people demand. This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility.
  • The Ten "Must Haves" for Secure Enterprise Mobility
    Source: Citrix
    White Paper: While enterprise mobility brings opportunity for your users and organization, it also invites risk - with data breach and data leakage topping the list of concerns. This concern grows as an increasing number of smartphones and tablets not only connect to the corporate network but also access a wide variety of business applications and content repositories. Download this white paper for an enterprise-ready mobile security framework and a checklist for evaluating enterprise mobility vendors.
  • The Benefits of Cloud Networking
    Source: Aerohive
    White Paper: Cloud networking introduces a new way to deploy, operate, & manage distributed enterprise networks. It delivers network capabilities via a cloud infrastructure with minimal capital investment or IT resources. This paper provides details on cloud networking, the state of the cloud market & its benefits
  • Secure Mobility Myth Buster
    Source: Samsung
    White Paper: Enterprise Mobility Management (EMM) (managing mobile devices like tablets, notebooks, and smartphones) is dynamic and multi-faceted. Organizations seeking mobility solutions are faced with conflicting security paradigms and divergent architectures, with competing solutions from dozens of software suppliers and device vendors.

    As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing and conflicting myths instead of useful information to guide key evaluation and acquisition decisions.

    This document reviews the more common myths and misconceptions about secure mobility and EMM, and a sensible and enlightened debunking of each.
  • Think Your User Authentication is "Good Enough"? Think Again
    Source: SMS PASSCODE
    White Paper: Recent high-profile hacks have made it clear: user names and passwords do a terrible job of protecting data. In response, the market is flooded with multi-factor authentication solutions claiming that they've got what it takes to keep you secure. Use this step-by-step guide to avoid the common pitfalls when selecting an authentication solution.
  • Best Practices for Fending off Hackers in the Cloud
    Source: SMS PASSCODE
    White Paper: Cloud services have become massively popular, as organizations enable remote access to more and more applications stored offsite. With this spike in remote access comes a new challenge in ensuring security and compliance by authenticating the identities of users accessing that data.
  • Security and BYOE - 3 Best Practices You Need to Know
    Source: SMS PASSCODE
    White Paper: When today's hacker and identity theft threats combine with the new challenges presented by the trend of 'bring your own device' (BYOD), companies must take decisive action to deliver secure, flexible and convenient authentication to employees and their devices alike.
  • Modern Threats Demand a New Breed of User Authentication
    Source: SMS PASSCODE
    White Paper: Modern cyber threats have overtaken the trusted first generation two-factor authentication tokens. A new generation of more secure real-time multi-factor authentication solutions is needed.
  • Exchange & BYOD: Avoid Disaster, Plan for Success
    Source: Good Technology
    White Paper: Exchange ActiveSync (EAS) is the protocol underpinning many BYOD programs. However, if not properly managed, the combination can be disastrous with an increasingly diverse set of untested devices connecting and potentially degrading Exchange performance. Learn how careful planning, good operational processes as well as new techniques and tools can help organizations avoid these pitfalls and make BYOD work.
  • Managing Large-Scale Mobile Deployments
    Source: Good Technology
    White Paper: As enterprise mobility becomes pervasive, service interruption can severely and adversely impact the bottom line. However, unlike tier-one systems that were designed, architected and built for reliability and supportability, the rapid emergence of mobility has necessitated a series of compromises. Is IT ready for the growing mobility challenge?
  • 10 Tips for Successful BYOD
    Source: Good Technology
    White Paper: No longer is BYOD a disconnected project with a handful of users... In fact, it's becoming an industry standard. BYOD can deliver improved user productivity, engagement and satisfaction, not to mention cost savings. Get the top 10 best practices for the successful implementation of a BYOD program.
  • Managing Exchange in a Post-PC World
    Source: Good Technology
    White Paper: A successful mobile deployment using ActiveSync depends on giving users a reliable, stable sync experience. But if any of the many moving parts in the EAS data path fail or degrade, the experience will suffer. Get ahead of EAS challenges by providing reliable mobile service.
    Download the managing EAS whitepaper >
  • Together at Last: BYOD and Solid Security
    Source: Good Technology
    White Paper: Employees want to use their own mobile devices, which is often met with IT resistance. But there's no need for conflict! Read this whitepaper - Give All the People What They Want (Safely) - to learn how you can give employees the freedom to BYOD, while still providing rock-solid enterprise security.
  • Best Practices to Reduce WAN Costs by up to 40%
    Source: Exinda
    White Paper: How much are you investing to manage your network? And are those investments delivering real value? For most organizations, wide area networks (WAN) are considered a necessary evil and make up the most significant network spend. Download our whitepaper on best practices to reduce WAN costs while solving today's pressing IT problems.

Results 1 - 15 of 862