Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

White Paper | Presented by Samsung

Biometric Authentication: The Future Is Now

Challenges with password management are leading more organizations to adopt biometric authentication solutions. In fact, a recent IDG Research survey of executives in the financial services and insurance industries finds that some firms are already adopting biometrics, and many more are looking to make the transformation in relatively short order.

Video/Webcast | Presented by 1E

Automate BIOS to UEFI for Secure Windows 10

In this webinar, 1E Technology Architect Mike Terrill and TrueSec Senior consultant Mikael Nystrom discuss expert tips on migrating to Windows 10 in the most secure way. This can be done using 1E's unique technology to automate the switch from BIOS to UEFI.

White Paper | Presented by Scandit

Deploy Mobile Data Capture Solutions to Improve Operations

This white paper outlines each stage of the enterprise mobile data capture ecosystem including investment, deployment and operations. Learn how your enterprise can replace dedicated barcode scanners and deploy cloud-connected mobile data capture solutions to reduce costs and improve operations.

Enterprise Mobile Threat Report

Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android.

IDG Whitepaper: IT Leaders Buying into Mobile Security

This whitepaper lays out the landscape on potential threats, how the mobile ecosystem is changing, and what security investment looks like from here out.

Key Business Insights for Mobile Security in a BYOD World

BYOD has made mobile security a much bigger challenge for enterprises. See what Forrester Consulting's national survey revealed.

Why Mobile Security?

The top five questions your security and IT peers have about mobile security, answered. Get details on top threats, critical gaps, and why enterprises need visibility into mobile today.

White Paper | Presented by 1E

Windows 10 Security: Understanding & Deploying Device Guard

This exclusive 1E White Paper will give you a detailed answer to the following questions, What is Device Guard designed to achieve?, What does Device Guard do and how does it do it?, What are the risks of not using Device Guard?, How should you implement Device Guard?

2016 Gartner Magic Quadrant for Enterprise Mobility Management Suites

The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader.

White Paper | Presented by Citrix Systems

Best Practices for Enterprise Security

How Citrix helps organizations manage risk while empowering business mobility by controlling access to applications and data across any location, network and device.

Load More