Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • eBooks // Jul 2014

    BYOD: Driving the mobile enterprise transformation

    Protecting corporate data and network resources while leveraging the benefits of mobility is a constant balancing act; one that requires IT to shift its focus from security lockdown to business enablement. While some companies (particularly in the tech sector) are “doing” BYOD well, most are still trying to devise a...

    Sponsored By MobileIron

  • White Papers // Jul 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Exclusive Aberdeen Group Analyst Report

    Are your finance and HR system silos helping or hurting your organization? Read this whitepaper from analyst firm Aberdeen Group to learn about the future of strategic business management, including key drivers for unification such as reporting processes and employee management.

    Sponsored By Workday

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Sponsored By IBM

  • White Papers // Jul 2014

    IaaS Public Clouds and the Perceived Security Threat

    Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We...

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    SDN and Cloud Computing

    After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes...

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    Ultra high efficiency cooling modules for large data centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2014

    Real-time Agility: Core Principles and Practices for Embedded-Software Teams

    This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.

    Sponsored By IBM

  • eBooks // Jul 2014

    Agile in the Embedded World

    The agile approach is unique in that it focuses on the important aspects of the development process: the people and the artifacts - software and hardware. Learn how Agile encourages developers to be more iterative, team-oriented, self-improving and customer focused.

    Sponsored By IBM

  • White Papers // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Sponsored By IBM

  • White Papers // Jul 2014

    Reducing Expenses Starts with the Programming Skills of Operations Groups

    Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today’s new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the...

    Sponsored By F5

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Live Event // Jul 2014

    Live Webcast: The Future of Meetings

    Join us for this LIVE event! Thursday, August 7, 2014 10 AM (PDT) / 1 PM (EDT) Let’s face it -- your meetings have likely gone a bit out of control. With more time allocated for gathering than for actual work, companies of all shapes and sizes are suffering from...

    Sponsored By Citrix Online

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    10 Critical Requirements for Cloud Applications

    Many Organizations are freeing up their valuable resources for strategic activities by deploying cloud applications that are less costly and complex. So the need to differentiate between the real cloud providers and applications from the imposters has become crucial. The purpose of this document is to help technology and business...

    Sponsored By Workday

  • White Papers // Jul 2014

    Ten Critical Requirements for Cloud Applications

    Many Organizations are freeing up their valuable resources for strategic activities by deploying cloud applications that are less costly and complex. So the need to differentiate between the real cloud providers and applications from the imposters has become crucial. The purpose of this document is to help technology and business...

    Sponsored By Workday

  • White Papers // Jul 2014

    10 Critical Requirements for Cloud Applications

    Many Organizations are freeing up their valuable resources for strategic activities by deploying cloud applications that are less costly and complex. So the need to differentiate between the real cloud providers and applications from the imposters has become crucial. The purpose of this document is to help technology and business...

    Sponsored By Workday

  • White Papers // Jul 2014

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Sponsored By Vormetric

  • White Papers // Jul 2014

    Meeting PCI DSS 3.0 Requirements with Data-at-Rest Encryption, Access Control and Data Access Audit Logs

    This white paper outlines how to use Vormetric Transparent Encryption to meet PCI DSS 3.0 Requirements with Data-at-Rest Encryption, Access Control and Data Access Audit Logs in traditional server, virtual, cloud and big data environments. The paper maps PCI DSS requirements 3, 7, 8, 9 and 10 that can be...

    Sponsored By Vormetric

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Sponsored By Palo Alto Networks

  • White Papers // Jul 2014

    2014 Survey Report - Remote Collaboration Challenges & Strategies to Overcome

    In late 2013, Polycom surveyed 5,000 business professionals from all job levels around the world that focused on collaboration challenges to support a mobile and flexible working environment. Download this survey to learn what these Senior IT professionals say are their biggest remote collaboration challenges and discover the strategies...

    Sponsored By Polycom, Inc.

  • White Papers // Jun 2014

    BYOD File Sharing – Go Private Cloud to Mitigate Data Risks

    The consumerization of IT and the popularity of BYOD (Bring Your Own Device) are jeopardizing the security and integrity of business data. Seeking an easy way to share files across smartphones, tablets, and desktops, employees are signing up for free public cloud file sharing services that lack rigorous security and...

    Sponsored By Accellion

  • White Papers // Jun 2014

    GigaOm Pro: The Rewards and Risks of Enterprise Mobility

    The productivity gains that are uniquely enabled by the cloud and mobile also present significant enterprise security challenges. Valuable and private data stored on mobile devices presents potential nightmare scenarios for departments and teams using the technology as well as CIOs, CSOs, and IT managers. This research report will outline...

    Sponsored By Accellion

  • White Papers // Jun 2014

    Data Security for Mobile Users: One Size Does Not Fit All

    Mobile computing is ubiquitous, but security solutions for mobile workers are not. For mobile security to be effective, tools and policies often need to be customized for specific users, roles, departments; or technologies. Rather than investing in solutions and enforcing security policies that treat all mobile users alike, IT should...

    Sponsored By Accellion

  • White Papers // Jun 2014

    Mobile Data Security: Best Practices for Securing Your Mobile Workforce

    The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short much of the time. Read this whitepaper to learn...

    Sponsored By Accellion

  • White Papers // Jun 2014

    Survey Report: Mobile Content Security and Productivity

    This report provides the key findings taken from a survey conducted by AIIM (an advocate and supporter of information professionals) between June and July 2013. Learn how important mobile access is to users, how likely they are to by-pass authorized systems, how compliant current collaboration practices are, and what collaboration...

    Sponsored By Accellion

  • White Papers // Jun 2014

    Headsets Mean Advantages for All

    Despite using multiple communication touchpoints everyday, studies show that nothing is more effective than voice at getting your point across.Headsets not only improve voice communication on calls, they also offer business benefits right the way across the enterprise. But as with all new technologies, some people will still need convincing....

    Sponsored By Plantronics

  • White Papers // Jun 2014

    Improve your Unified Communications ROI

    IT decision makers concentrate hard on vintegrating real-time tools like instant messaging and voice and video conferencing with voicemail, email and text messages, they neglect the emotional and informational needs of the end user. The result? Your company has made a significant investment on a flawless UC platform and cutting...

    Sponsored By Plantronics

  • White Papers // Jun 2014

    Ten Steps to Selecting Voice tools your Colleagues will use and value

    You’ve thought long and hard about how best to invest in new technologies. You know integrating your communications tools could yield huge rewards – both in terms of ROI and in helping your colleagues to collaborate and perform at their very best. But how can you ensure your people adopt,...

    Sponsored By Plantronics

  • White Papers // Jun 2014

    2014 IBM Cyber Security Intelligence Index

    When IBM talked to 1,000 clients about security attacks that occurred in 2013, three things became abundantly clear: criminals are relentless, every business—across every industry—is affected, and your perimeter may have already been breached. Read the white paper to learn the findings from the analysis of billions of security events...

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    Critical Data Protection Program by IBM Security Services

    Critical data is the small but most important portion of data vital to business survival and success. It includes sensitive financial and customer data, data that enables critical business processes, and proprietary data such as trade secrets, intellectual property, research and development, and confidential business plans and communications, learn how...

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    IBM X-Force Threat Intelligence Quarterly - Q1 2014

    Understand more about the latest IT security threats. This report is an analysis of the security landscape, designed to help organizations better understand the latest security risks. Download this comprehensive report and learn how: Security incidents have been steadily rising in 2013. Cyber-criminals use malicious code...

    Sponsored By IBM

  • White Papers // Jun 2014

    Building the Mobile Enterprise - Integrated, Secure and Productive

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your...

    Sponsored By IBM

  • White Papers // Jun 2014

    2013 CISO Assessment Survey Paper

    Get the latest on a new standard for security leaders. The 2013 Assessment is based on interviews with security leaders on leading business practices, technologies and measurement. Download this assessment to learn about: Leading business practices. Technologies – including Cloud and Mobile. Business Measurement.

    Sponsored By IBM

  • Webcasts // Jun 2014

    On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

    Sponsored By SAP

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    SDN: How It Will Affect You and Why You Should Care

    You may have heard about software-defined networking (SDN) and its cousin network functions virtualization (NFV). These emerging technologies are likely to revolutionize the IT industry as well as your job. This white paper introduces you to SDN and NFV, examines their impact on you as well as the industry, and...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Department of Defence Australia secured by CA and BST Tech

    Business: BSTTech Consulting provides security and information processing solutions to a global customer base, specialising in the defence sector. Headquartered in Australia, it prides itself on being recognised as a thought-leader in security and information sharing. Challenge: When the Department of Defence (DoD) enlisted its help, BSTTech Consulting needed to...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    TechViews Podcast: The Security Reality in 2014

    IT security is a brave new world for enterprise companies. As threats increase in frequency and variation, IT security teams must also allow more access to corporate assets and data than ever before. New trends like BYOID challenge traditional security measures, but enable ease of use for consumers. Striking a...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Accelerate Mobile App Initiatives with APIs

    Businesses are differentiating through mobile app initiatives. But what’s fueling the development and delivery of mobile app projects – APIs! CA delivers an API Management solution that accelerates development, optimizes performance and secures the mobile channel end-to-end.

    Sponsored By CA Technologies