ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security White Papers

  • Talent Management: Key Steps to Improving Employee-Manager Engagement

    Sponsored by: Workday

    This white paper surveys several avenues to driving employee-manager engagement, allowing managers to spend less time with administrative tasks and more time keying into talent management. Read on to find out how to achieve world-class customer service.

  • Your Performance Report Card: Winning with Work Optimizing

    Sponsored by: Workday

    Today's environment is intensely competitive regardless of industry, and companies are increasingly relying on their people to drive differentiation in the workplace. This white paper explains how to give your company an edge, driving your enterprise's competitiveness using 4 key guidelines.

  • Drive business growth with mobile workspaces

    Sponsored by: Citrix

    Access this white paper to learn about a complete mobile workspace solution that provides all the technologies you need to get started implementing your enterprise mobility strategy today. Also, explore the benefits of having a mobile workspace solution in your organization.

  • Video Beyond the Boardroom: 4 Steps to Improving Call Quality

    Sponsored by: Vyopta

    Does your organization enjoy the benefits of video conferencing and video collaboration? With increased use of these resources, your IT team probably has a much bigger challenge of managing mobile devices. This eBook reviews the fundamentals of new video conferencing call quality metrics.

  • Beyond one person, one desk, one device

    Sponsored by: Citrix

    Access this white paper to learn how local councils are adopting virtual desktop solutions to transform their organizations. Also, discover a list of important considerations when assessing alternative virtual desktop solutions.

  • Best practices to enable clinician mobility for patient centered healthcare

    Sponsored by: Citrix

    This white paper offers tips for healthcare organizations seeking the benefits of a more mobile environment. Read on to learn strategies, solutions, and real-world examples for transforming healthcare IT without sacrificing security or compliance.

  • Managing the Madness of Mobility

    Sponsored by: Sprint

    For too long, high buy-in costs, time-consuming management tasks, and rigid, inflexible data plans have stopped businesses from empowering their employees with the latest productivity-boosting wireless. This e-book highlights a new model for mobility-as-a-service, and details several of its benefits.

  • Are You Doing All You Can to Protect Your Critical Business Information?

    Sponsored by: Citrix

    This resource discusses how you can move on from your outdated strategies and adopt security designed for today's threats.

  • 5 Best Practices to Make Security Everyone's Business

    Sponsored by: Citrix

    This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.

  • Safeguarding Data and the Mobile Enterprise

    Sponsored by: IBM

    As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.

  • Case Study: Achieving Next Generation Endpoint Protection

    Sponsored by: CrowdStrike

    This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.

  • The 10 Keys to Seeing 20/20 on Your EMM Vision

    Sponsored by: Accelerite

    Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.

  • Make Your Security Proactive, Not Reactive

    Sponsored by: CrowdStrike

    This report explains how indicators of attack – suspicious behaviors that can alert organizations to a potential hacks – can be instrumental in preventing sophisticated, targeted attacks.

  • Cyber Attack Survival Checklist

    Sponsored by: CrowdStrike

    This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.

  • Business Analytics in the Cloud

    Sponsored by: IBM

    This white paper explores the role of cloud computing in driving the benefits that analytics can provide. Discover how multiple industries are gaining advantages from cloud-based analytics from both an IT and a business perspective.

  • Five customers deliver virtual desktops and apps to empower a modern workforce

    Sponsored by: Citrix

    Access this white paper to explore a comprehensive app and desktop virtualization solution that depending on their key business priorities, will deliver the right kind of virtual desktop experience to each user. Discover use cases that help to address important business priorities.

  • Today's State of Mobile App Security

    Sponsored by: IBM

    Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.

  • Securing Information in the New Digital Economy

    Sponsored by: Oracle Corporation

    This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.

  • 4 Secrets to Security: Engaging a Meaningful Dialogue

    Sponsored by: Citrix

    Board meetings can be an opportunity to engage your company's most senior leaders in a strategic dialogue not only about security, but about mobility, cloud computing, and the evolution of the workplace. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.

  • Empowering Information Security with Desktop Virtualization

    Sponsored by: Citrix

    This white paper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth.

  • Strengths and Weaknesses of 13 SIEM Solutions

    Sponsored by: AlienVault

    This Gartner report provides detailed reviews of the strengths and weaknesses of 13 different SIEM solutions.

  • Maximizing Your Video Utilization: The Best Practices

    Sponsored by: Vyopta

    In order to ensure maximum return on investment for your video collaboration, taking advantage of new desktop and mobile software that make it possible to deliver high-quality video experience is crucial. This white paper highlights some of the best practices for maximizing enterprise video utilization.

  • Mobilize Your Email with Enterprise-Grade Security and Data Protection

    Sponsored by: Citrix

    This white paper explains how to mobilize your email with enterprise-grade security that can increase productivity, while giving IT the flexibility to meet the unique requirements of different use cases and data types.

  • Top Five Ways to Improve Cost Efficiencies And Reduce TCO With Desktop Virtualization

    Sponsored by: Dell, Inc. and Intel®

    Access this white paper to examine the top five ways you can improve cost efficiencies and reduce TCO with desktop virtualization. Also, learn about the technologies that can provide the best opportunity to reduce costs and complexity.

  • 10 Vital Questions for Evaluating Your Mobile Security Strategy

    Sponsored by: Citrix

    Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.