Skip Links

Network World

Resource Library

  • The Guide to Modern Endpoint Backup and Data Visibility
    Source: Code42
    White Paper: Endpoint data backup is the foundation of an effective enterprise data security strategy. With half of enterprise data living on the endpoints, the attack surface is wide and risk of data leakage, loss, theft and breach is great. Modern endpoint backup goes beyond backup and restore to enable IT, InfoSec and Legal/Risk/Compliance teams in:

    -Reducing risk
    -Recovering from ransomware
    -Accelerating tech refresh and data migration
    -Cutting cost and complexity from legal hold
    -Meeting data privacy and retention requirements
    -Mitigating and remediating the effects of breach
    -Identifying insider threats via data activity monitoring

    Learn how modern endpoint backup protects your data, reduces risk and guarantees recovery in a dangerous world. Download The Guide to Modern Endpoint Back and Data Visibility today.
  • Cyberthreat Defense Report
    Source: Code42
    White Paper: CyberEdge Group's third annual Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1000 IT security decision makers and practitioners conducted in November 2015, the report delivers insights IT security teams can use to compare their perceptions, priorities, and security postures to their peers.

    Download the 2016 Cyberthreat Defense Report and Code42 CDR Executive Brief to gain fresh insights about:

    -Why 62% of organizations expect to be breached this year (up from 39% two years ago!)
    -Which cyberthreats concern organizations the most in 2016
    -The ineffectiveness of traditional endpoint security
  • Forrester Wave: Enterprise Mobile Management Q4 2015, IBM is a Leader
    Source: IBM Corporation
    White Paper: The 11 Providers That Matter Most And How They Stack Up

    In Forrester's 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers - AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti - and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
  • 2015 Gartner Report: Magic Quadrant for Enterprise Mobility Management Suites
    Source: IBM Corporation
    White Paper: Enterprise mobility management suites are the glue that connects mobile devices to their enterprise workflow. End-user computing leaders must consider short-term and long-term objectives amid rapid market changes.
  • The State of Mobile Application Insecurity - Ponemon Institute Research Report
    Source: IBM Corporation
    White Paper: We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
  • Mobile is the New Playground for Thieves
    Source: IBM Corporation
    White Paper: Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities.
  • The Productivity Transformation
    Source: IBM Corporation
    White Paper: This paper will explore the rapid workplace productivity transformation of securing enterprise content so employees can use smartphones and tablets to run their business from the palms of their hands.
  • When Business is the App, The App is the Business - Vol 1
    Source: IBM Corporation
    White Paper: In this volume, get the lay of the enterprise mobile app landscape. Learn how apps are one of the biggest mobility priorities of business today; why using best practices in app design, development and deployment is critical; and how you, in IT, are well positioned to be the enterprise hero in this app revolution.
  • When App is the Business, the Business is the App Vol. 2
    Source: IBM Corporation
    White Paper: In this volume, learn how to design a business-driven app strategy that advances business goals - without putting enterprise data and your network at risk.
  • When App is the Business, the Business is the App Vol. 3
    Source: IBM Corporation
    White Paper: In this volume, learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.
  • Best Practices for Mobile Application Lifecycle Management
    Source: IBM Corporation
    White Paper: Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
  • Mobilize Your Corporate Content and Apps
    Source: IBM Corporation
    White Paper: Many companies still rely on email as the "app of choice" that enables employees to communicate outside of the office. And this was a huge win even just a couple of years ago. However, let's face it, checking email and responding outside of the office is not exactly "working" so much as removing a few obstacles, moving things along, and keeping up appearances.
  • Mobile Data Security
    Source: IBM Corporation
    White Paper: The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own.
  • Fueling "Free Markets" in the Insight Economy with Apache Spark
    Source: IBM
    White Paper: Big data is fueling a new economy-one based on insight. The large volume and variety of data available today offers the possibility of seeing things in new ways. If you can harness the power of big data, you can identify emerging opportunities, improve the customer experience, enhance operational efficiencies, reduce risks and more. How can you create the valuable insights that are the currency for the new economy while controlling complexity? Apache Spark might be the answer.
  • IBM DataWorks Solution Brief
    Source: IBM
    White Paper: The era of cloud computing, big data and the Internet of Things is creating information overload for the enterprise. There is now more data being created and collected than business intelligence and data science teams have the time or resources to analyze.

Results 1 - 15 of 737