Your Search returned 6 results from our Editorial content

Sort By
  • Close-button

    BYOD (Bring Your Own Device)

BYOD (BRING YOUR OWN DEVICE)

There’s More to IT Security Than a Cyber-Attack

The recent ‘National Strategic Assessment of Serious and Organised Crime 2014’ report showed just how much danger UK businesses are facing from third party cyber-security...

   

BYOD (BRING YOUR OWN DEVICE)

The Real BYOD Impact: Device Fragmentation Challenges -...

What's the real impact of Bring Your Own Device (BYOD), and how is it causing the fragmentation of devices in the workplace?

BYOD (BRING YOUR OWN DEVICE)

Top Summer Security Scares for Enterprise IT

For enterprise employees, the summer is time to relax, spend time with family and friends, and make the most of the (hopefully good) weather. For the IT department...

   
   

Your Search returned 90 results from our White Paper Library

Sort By
  • Close-button

    BYOD (Bring Your Own Device)

Citrix

BYOD (Bring Your Own Device)

The Complete Solution for Enabling BYO

Download this white paper that offers the complete solution for enabling BYO.


Citrix

BYOD (Bring Your Own Device)

Best Practices to Make BYOD Simple and Secure

This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt...


Citrix

Desktop Virtualization

The Key to Embracing the Consumerization of IT

Organizations are learning how to leverage desktop virtualization to accommodate the consumerization of IT.


Citrix

BYOD (Bring Your Own Device)

Empowering Business Mobility Through Virtualization

This white paper describes options for a mobile services-focused computing architecture that empowers productivity through workshifting, consumerization...


Citrix

Remote Access Security

Delivering Corporate Data Securely on Employee iPads

This paper describes the issues that arise when allowing iPads into the enterprise network and the steps IT must take to maintain control.


IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...


Citrix

Desktop Virtualization

Workshifting: a global market research report

Based on insight from senior IT decision-makers, this report reveals how organizations are benefiting from desktop virtualization.


Aruba Networks

Wi-Fi

Get Your Wi-Fi Ready for Mobile Applications: Top 10 Considerations...

Preparing the Wi-Fi network for the growing number of mobile applications requires more than just a simple upgrade of the network. This white provides...


Alcatel-Lucent

Network Traffic Management

Building Your Carrier Wi-Fi Strategy

As cable MSOs and fixed service providers look to develop Carrier Wi-Fi strategies that will help them gain a competitive advantage, questions and concerns...


Blue Coat

BYOD (Bring Your Own Device)

Solution Brief: Top Five Considerations for a BYOD Policy...

Though BYOD offers a new way of working and a host of benefits, it also presents a swathe of new security issues. See the top five considerations for a...


Previous 1 3 4 5 8 9

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

Blockchain For Dummies: What you really need to know

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?