ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Research

  • Establishing a Mobile Security Architecture

    Sponsored by: Oracle Corporation

    This resource can help you build a new security architecture that embraces mobility.

  • Taking Advantage of the General Data Protection Regulation

    Sponsored by: Oracle Corporation

    This resource provides a breakdown all of the information you need to navigate the data security changes brought by the upcoming General Data Protection Regulation.

  • How VMware Enables the Anywhere Workplace

    Sponsored by: Data#3

    When developing and implementing a new enterprise mobility strategy, which capabilities are most important to you? This animated video highlights one such all-in-one enterprise mobility strategy service from VMware, and includes advice on how to successfully implement SaaS and SSO in your business.

  • Talent Management: Key Steps to Improving Employee-Manager Engagement

    Sponsored by: Workday

    This white paper surveys several avenues to driving employee-manager engagement, allowing managers to spend less time with administrative tasks and more time keying into talent management. Read on to find out how to achieve world-class customer service.

  • Your Performance Report Card: Winning with Work Optimizing

    Sponsored by: Workday

    Today's environment is intensely competitive regardless of industry, and companies are increasingly relying on their people to drive differentiation in the workplace. This white paper explains how to give your company an edge, driving your enterprise's competitiveness using 4 key guidelines.

  • Drive business growth with mobile workspaces

    Sponsored by: Citrix

    Access this white paper to learn about a complete mobile workspace solution that provides all the technologies you need to get started implementing your enterprise mobility strategy today. Also, explore the benefits of having a mobile workspace solution in your organization.

  • Video Beyond the Boardroom: 4 Steps to Improving Call Quality

    Sponsored by: Vyopta

    Does your organization enjoy the benefits of video conferencing and video collaboration? With increased use of these resources, your IT team probably has a much bigger challenge of managing mobile devices. This eBook reviews the fundamentals of new video conferencing call quality metrics.

  • Beyond one person, one desk, one device

    Sponsored by: Citrix

    Access this white paper to learn how local councils are adopting virtual desktop solutions to transform their organizations. Also, discover a list of important considerations when assessing alternative virtual desktop solutions.

  • Best practices to enable clinician mobility for patient centered healthcare

    Sponsored by: Citrix

    This white paper offers tips for healthcare organizations seeking the benefits of a more mobile environment. Read on to learn strategies, solutions, and real-world examples for transforming healthcare IT without sacrificing security or compliance.

  • Managing the Madness of Mobility

    Sponsored by: Sprint

    For too long, high buy-in costs, time-consuming management tasks, and rigid, inflexible data plans have stopped businesses from empowering their employees with the latest productivity-boosting wireless. This e-book highlights a new model for mobility-as-a-service, and details several of its benefits.

  • Are You Doing All You Can to Protect Your Critical Business Information?

    Sponsored by: Citrix

    This resource discusses how you can move on from your outdated strategies and adopt security designed for today's threats.

  • How Microsoft Enables The Anywhere Workplace

    Sponsored by: Data#3

    With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This animated video provides a framework for developing and implementing successful enterprise mobility strategies, as demonstrated by Microsoft's enterprise software suite.

  • 5 Best Practices to Make Security Everyone's Business

    Sponsored by: Citrix

    This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.

  • Safeguarding Data and the Mobile Enterprise

    Sponsored by: IBM

    As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.

  • Case Study: Achieving Next Generation Endpoint Protection

    Sponsored by: CrowdStrike

    This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.

  • The 10 Keys to Seeing 20/20 on Your EMM Vision

    Sponsored by: Accelerite

    Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.

  • Make Your Security Proactive, Not Reactive

    Sponsored by: CrowdStrike

    This report explains how indicators of attack – suspicious behaviors that can alert organizations to a potential hacks – can be instrumental in preventing sophisticated, targeted attacks.

  • App Refactoring: How to Extend Application Virtualization

    Sponsored by: StarMobile

    In this webcast, Todd Bryburger from StarMobile joins Brian Madden to discuss app refactoring, and how to extend application virtualization to capitalize on all enterprise mobility spaces.

  • Cyber Attack Survival Checklist

    Sponsored by: CrowdStrike

    This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.

  • Business Analytics in the Cloud

    Sponsored by: IBM

    This white paper explores the role of cloud computing in driving the benefits that analytics can provide. Discover how multiple industries are gaining advantages from cloud-based analytics from both an IT and a business perspective.

  • Five customers deliver virtual desktops and apps to empower a modern workforce

    Sponsored by: Citrix

    Access this white paper to explore a comprehensive app and desktop virtualization solution that depending on their key business priorities, will deliver the right kind of virtual desktop experience to each user. Discover use cases that help to address important business priorities.

  • Today's State of Mobile App Security

    Sponsored by: IBM

    Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.

  • Test Drive a Comprehensive Security Platform

    Sponsored by: AlienVault

    This free demo allows you to test out a security platform that promises to help you better monitor, analyze and report on malicious behavior in your network.

  • Securing Information in the New Digital Economy

    Sponsored by: Oracle Corporation

    This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.

  • 4 Secrets to Security: Engaging a Meaningful Dialogue

    Sponsored by: Citrix

    Board meetings can be an opportunity to engage your company's most senior leaders in a strategic dialogue not only about security, but about mobility, cloud computing, and the evolution of the workplace. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.