Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 19 results from our White Paper Library

Sort By
BlackBerry

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


BlackBerry

Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


BlackBerry

Mobile Applications

The CIO's Guide to Wireless in the Enterprise

Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.


IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...


Aruba Networks

WLAN

What To Expect from 802.11AC

The extensions of the physical-layer wireless techniques pioneered in 802.11n which make up the final 802.11ac Wi-Fi standard will have a major impact...


Aruba Networks

Wi-Fi

Get Your Wi-Fi Ready for Mobile Applications: Top 10 Considerations...

Preparing the Wi-Fi network for the growing number of mobile applications requires more than just a simple upgrade of the network. This white provides...


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

University Creates Flawless BYOD Experience for Staff and...

Brunel University needed to deliver wireless access to students in more than 70 buildings campus-wide.


Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....


Logitech

Wireless Technologies

Free Yourself from Your Desk with Logitech’s New Bluetooth...

This blog explains how Logitech’s new keyboard and mouse give you the freedom to work wherever, on any computing device.


BitSight Technologies

Security

40 Questions You Should Have in Your Vendor Security Assessment...

There are thousands of questions you could ask your vendor about security. Can you determine which of them are the most important?


Previous 1

Blogs

mark-chillingworth

CIO Watch

DevOps is a CIO’s theory of evolution

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Bitcoin anonymity advocates ignore a darker truth

Jon Collins’ in-depth look at tech and society

Most Recent Comments

no-image

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Would a Brexit be bad for UK tech?