Your Search returned 0 results from our Editorial content

Sort By

Your Search returned 32 results from our White Paper Library

Sort By

Mobile Device Management

An IT Manager’s Guide to Managing Personal Devices in the...

You can't avoid it any longer: A strategy for managing employees' personal mobile devices. Learn how to create a more secure and manageable mobile enterprise...


Wireless Security

Technology Audit: IronKey Enterprise

IronKey Enterprise is a secure, encryption-based management solution for the protection of data that is copied to USB flash drives. Operating as removable...


Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


Mobile Applications

The CIO's Guide to Wireless in the Enterprise

Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.

Kaspersky Lab

Wireless Security

Enterprise Mobile Security Survey

Download the results from our Enterprise Mobile Security Survey to see how your own organization's security processes stack up against your peers…and where...

IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...

CDW & Symantec

Identity Fraud & Theft

Data and Identity Security

This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve....

CDW & Symantec

Enterprise Data Privacy

Chief Information Security Officers Get Serious about Mobile...

This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure...


Wireless Technologies

4G: The What, Why and When

The development of 4G has seen widespread debate over its definition. This white paper clarifies the technological definition of 4G, presents business...

Previous 1 3 4

Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/bit9-carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?