Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 25 results from our White Paper Library

Sort By
Sybase

Mobile Device Management

An IT Manager’s Guide to Managing Personal Devices in the...

You can't avoid it any longer: A strategy for managing employees' personal mobile devices. Learn how to create a more secure and manageable mobile enterprise...


IronKey

Wireless Security

Technology Audit: IronKey Enterprise

IronKey Enterprise is a secure, encryption-based management solution for the protection of data that is copied to USB flash drives. Operating as removable...


BlackBerry

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


BlackBerry

Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


BlackBerry

Mobile Applications

The CIO's Guide to Wireless in the Enterprise

Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.


IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...


Tellabs

Wireless Technologies

4G: The What, Why and When

The development of 4G has seen widespread debate over its definition. This white paper clarifies the technological definition of 4G, presents business...


Aruba Networks

WLAN

What To Expect from 802.11AC

The extensions of the physical-layer wireless techniques pioneered in 802.11n which make up the final 802.11ac Wi-Fi standard will have a major impact...


Aruba Networks

Wi-Fi

Get Your Wi-Fi Ready for Mobile Applications: Top 10 Considerations...

Preparing the Wi-Fi network for the growing number of mobile applications requires more than just a simple upgrade of the network. This white provides...


Fluke Networks

Wireless Security

Overlay vs. Integrated Wireless Security

There are pros and cons of different approaches to wireless intrusion prevention systems (WIPS) and a few different ways to deploy monitoring systems that...


Previous 1 3

Blogs

jon-collins

Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond

no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems

Poll

Does Altruistic Malware introduce more risk despite good intentions?