Skip the navigation

Topic Center White Papers

Topic Center white papers and technology resources for implementing and optimizing Topic Center strategy, solutions, Topic Center products, and more.

5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce

Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.

Sponsor: Citrix


 

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.

Sponsor: Citrix


 

IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment

IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and ability to push the client virtualization agenda for the rest of the industry". Download the MarketScape now.

Sponsor: Citrix


 

Infographic: Top Use Cases for Desktop Virtualization

A range of business issues are driving IT towards desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their workforces, one project at a time. See the trends driving the adoption of virtual desktops and the top use cases IT teams are deploying today

Sponsor: Citrix


 

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth

Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop with FlexCast allows you to use a variety of methods to balance user requirements and costs for each use case in your organization.

Sponsor: Citrix


 

Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques

Sophisticated cybercriminals are using advanced evasion techniques (AET), which deliver an exploit or malicious content into a vulnerable target so that the traffic looks normal, to bypass most existing security solutions. McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect this type of attack. It has been successfully tested against more than 800 million AET variants.

Sponsor: McAfee


 

The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs)

In early 2014, McAfee commissioned research group Vanson Bourne to determine the level of understanding IT security professionals have about AETs and the defenses they have put in place to stop them. The findings, summarized in this executive summary, show that most respondents do not fully understand AETs and, as a consequence, are not deploying comprehensive security solutions to thwart them.

Sponsor: McAfee


 

Demand More, Get the Most from the Move to a Next-Generation Firewall

Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Sponsor: McAfee


 

Augmented VPN

Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.

Sponsor: McAfee


 

Protect Against Advanced Evasion Techniques

Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.

Sponsor: McAfee


 

Advanced Evasion Techniques for Dummies

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here's advice on how to evade AETs.

Sponsor: McAfee


 

IDC Report: Optimize IT and Business Gains

Data is increasingly critical to driving business. This IDC Whitepaper outlines how CIOs can understand what the "total cost of data" is across their entire organization and how Delphix can assist them in managing the data that drives the business forward.

Sponsor: Delphix


 

Reduce IT Burdens: Regulation, Legal Hold & Discovery

Companies too often overlook the business gains a better archiving strategy can deliver, from enabling access to and preservation of critical data to more easily complying with regulations. Download this white paper to learn how Delphix can be an integral part of ensuring your archiving strategy actually enables your business.

Sponsor: Delphix


 

Mitigate Risk and Accelerate Time to Value

Making your IT organization more elastic and efficient is hard. Doing it while staying in compliance with regulations is even harder. Download this white paper to learn how your IT organization can accelerate business, introduce new services, and reach new markets, all while staying in compliance.

Sponsor: Delphix


 

Allay Risks in Application Rationalization and Modernization

IT has to do it all: react quickly to market needs, introduce new services, capitalize on mobile, and comply with regulatory requirements, all without raising costs and complexity. Delphix has the platform to enable IT teams to navigate their business past the risks, saving money and time.

Sponsor: Delphix


 

Delivering Application Data On-Demand

Packaged application development teams frequently operate with limited testing environments due to time and labor constraints. By virtualizing the entire application stack, packaged application development teams can deliver business results faster, at higher quality, and with lower risk.

Sponsor: Delphix


 

Agile Masking Transforms Data Security

Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix's Agile Masking solution is the only product that solves both masked data creation and delivery challenges.

Sponsor: Delphix


 

Budd Van Lines Moves Data Closer to Home

Shipping and logistics company Budd Van Lines uses Infinio to improve performance on their VDI environment. The company employs a virtualized datacenter based on VMware vSphere supporting XenApp/XenDesktop for VDI.

Sponsor: Infinio Systems


 

Storage Performance with Cost Control

As IT groups expand their server virtualization initiatives, central storage performance can become the bottleneck and create poor end user experience. ESG talks about how server-side, content-based caching can offer a better solution when you need more performance from your storage and not capacity.

Sponsor: Infinio Systems


 

Server-side Caching for the VMware Admin

There was a time when virtualization reduced hardware demands. While that's still true, we now realize an unforeseen danger: the performance trap. vExpert David Davis weights in on how best-in-class server-side caching solutions can drastically improve storage performance and reduce latency without the addition of new hardware.

Sponsor: Infinio Systems