Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

...or search.
white paper | Presented by Good Technology

Managing Large-Scale Mobile Deployments

As enterprise mobility becomes pervasive, service interruption can severely and adversely impact the bottom line.

white paper | Presented by Good Technology

Exchange & BYOD: Avoid Disaster, Plan for Success

Learn how careful planning, good operational processes as well as new techniques and tools can help organizations avoid these pitfalls and make BYOD work.

white paper | Presented by SMS PASSCODE

Security and BYOE - 3 Best Practices You Need to Know

When today's hacker and identity theft threats combine with the new challenges presented by the trend of BYOD, companies must take decisive action to deliver secure, flexible and convenient authentication to employees and their devices alike.

white paper | Presented by SMS PASSCODE

Best Practices for Fending off Hackers in the Cloud

Cloud services have become massively popular, as organizations enable remote access to more and more applications stored offsite.

white paper | Presented by SMS PASSCODE

Think Your User Authentication is "Good Enough"? Think Again

Recent high-profile hacks have made it clear: user names and passwords do a terrible job of protecting data. Use this step-by-step guide to avoid the common pitfalls when selecting an authentication solution.

white paper | Presented by Samsung

Secure Mobility Myth Buster

As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing myths instead of useful information. This document reviews the more common myths and misconceptions about secure mobility.

research/infographic | Presented by Samsung

Security? Leave it to Me! Samsung KNOX

Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more.

research/infographic | Presented by Samsung

Is your smartphone secure enough?

Today more than 79% of businesses worldwide have experienced mobile security breaches. Meet the future of secure Android. KNOX delivers the security needed for your enterprise's Samsung devices.

video/webcast | Presented by EMC

Preventing Data Breaches with Data Access Governance

Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.

Load More