Skip Links

Network World

Resource Library

  • Deploy Mobile Data Capture Solutions for Improved Operations
    Source: Scandit
    White Paper: This white paper outlines each stage of the enterprise mobile data capture ecosystem including investment, deployment and operations. Learn how your enterprise can replace dedicated barcode scanners and deploy cloud-connected mobile data capture solutions to reduce costs and improve operations.
  • What to Look for When Considering an SD-WAN Solution
    Source: Citrix Systems
    White Paper: Selecting the optimal SD-WAN solution for your enterprise is not easy, but with vendors and industry analysts all talking about the same topics using the same buzzwords, it's hard to decide what features are most important and how to differentiate between products. This paper lays out some important factors to consider when selecting an SD-WAN solution.
  • Building a Software-Defined WAN with NetScaler SD-WAN
    Source: Citrix Systems
    White Paper: This white paper provides an overview of the NetScaler SD-WAN solution available from Citrix. It discusses how NetScaler SD-WAN can improve the reliability, performance and security of business critical applications such as VDI, application virtualization, VoIP, video conferencing and ERP while reducing costs and simplifying branch office infrastructure.
  • Citrix NetScaler SD-WAN Product Overview
    Source: Citrix Systems
    White Paper: This solution brief introduces Citrix NetScaler SD-WAN, a solution that ensures users remain connected at all times -- connected to the data center, the cloud, their applications and each other -- while strengthening network security, providing visibility and simplifying the branch network. Learn more.
  • Windows 10 Security: Understanding & Deploying Device Guard
    Source: 1E
    White Paper: This exclusive 1E White Paper will give you a detailed answer to the following questions
    -What is Device Guard designed to achieve?
    -What does Device Guard do and how does it do it?
    -What are the risks of not using Device Guard?
    -How should you implement Device Guard?
  • Enterprise Mobile Threat Report
    Source: Lookout Mobile Security
    White Paper: Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android.
  • Key Business Insights for Mobile Security in a BYOD World
    Source: Lookout Mobile Security
    White Paper: BYOD has made mobile security a much bigger challenge for enterprises. See what Forrester Consulting's national survey revealed.
  • IDG Whitepaper: IT Leaders Buying into Mobile Security
    Source: Lookout Mobile Security
    White Paper: This whitepaper lays out the landscape on potential threats, how the mobile ecosystem is changing, and what security investment looks like from here out.
  • Why Mobile Security?
    Source: Lookout Mobile Security
    White Paper: The top five questions your security and IT peers have about mobile security, answered. Get details on top threats, critical gaps, and why enterprises need visibility into mobile today.
  • Taking Windows Mobile on Any Device
    Source: Citrix Systems
    White Paper: Taking Windows applications and desktops mobile has many advantages, but the process of identifying a single solution is complex. Learn how Citrix XenApp solves this complex problem.
  • Empower a Mobile Workforce with Secure App Delivery
    Source: Citrix Systems
    White Paper: Mobility has given people new freedom to work anywhere, on any device- but it has also added new complications for IT. Learn how Citrix XenApps helps people be productive on any device.
  • Best Practices for Enterprise Security
    Source: Citrix Systems
    White Paper: How Citrix helps organizations manage risk while empowering business mobility by controlling access to applications and data across any location, network and device.
  • How Can I Protect Privileged Credentials Across my Traditional and Virtual Data Centers, Private and Public Clouds and Hybrid Environments?
    Source: CA Technologies
    White Paper: Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization' investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
  • Breaking the Kill Chain: Stopping Data Breaches with Privileged Access Management
    Source: CA Technologies
    White Paper: When we consider the current stream of security incidents, it's common to refer back to the Target incident, which began in late 2013. With some 70 million payment card records stolen, Target wasn't the first-or even largest-data breach to take place in history, let alone in 2013. However, for a variety of factors, the Target breach did serve to galvanize the interest of multiple critical constituencies in the intensely damaging nature of these ongoing attacks. Since the Target breach, we've witnessed countless smaller, less publicized breaches, along with a continuing string of larger-scale incidents, such as the Home Depot and JP Morgan Chase incidents about one year later and most recently, as of this writing, the Experian breach of the extremely sensitive personal data of some 15 million T-Mobile customers.
  • Addressing PCI Compliance: Through Privileged Access Management
    Source: CA Technologies
    White Paper: Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.1 PCI DSS v3 established various requirements for safeguarding an organization's relevant systems and networks, comprising the Cardholder Data Environment (CDE). With requirements for strong authentication and access control to the CDE, organizations are challenged with the difficult tasks of implementing multi-factor authentication, access control and activity reporting tools or practices, particularly for privileged or administrative access to these systems.

Results 1 - 15 of 611