Your Search returned 0 results from our Editorial content

Sort By

Your Search returned 34 results from our White Paper Library

Sort By

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


Mobile Applications

The CIO's Guide to Wireless in the Enterprise

Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.

IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...

Aruba Networks


What To Expect from 802.11AC

The extensions of the physical-layer wireless techniques pioneered in 802.11n which make up the final 802.11ac Wi-Fi standard will have a major impact...

Aruba Networks


Get Your Wi-Fi Ready for Mobile Applications: Top 10 Considerations...

Preparing the Wi-Fi network for the growing number of mobile applications requires more than just a simple upgrade of the network. This white provides...

Cisco Systems, Inc.

BYOD (Bring Your Own Device)

University Creates Flawless BYOD Experience for Staff and...

Brunel University needed to deliver wireless access to students in more than 70 buildings campus-wide.

Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....


Wireless Technologies

Free Yourself from Your Desk with Logitech’s New Bluetooth...

This blog explains how Logitech’s new keyboard and mouse give you the freedom to work wherever, on any computing device.

BitSight Technologies


40 Questions You Should Have in Your Vendor Security Assessment...

There are thousands of questions you could ask your vendor about security. Can you determine which of them are the most important?

Previous 1 3 4



Thinking Different

Taking baby steps with Big Data

Jon Collins’ in-depth look at tech and society


China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond


CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk


Crowdfunding: Viable alternative to VC funding or glorified marketing?