citrix

Results 76 - 100 of 607Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
The General Data Protection Regulation(GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Tags : 
data security, data protection, risk reduction, security regulation, data breach
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Functionality, cost effectiveness and efficiency drive your firm. Apply those standards to sharing large files if you want to beat competitors who use standard, less professional file-sharing tools with clients. Read this e-book to discover how you and your firm can: Avoid the unreliability and time-consuming limitations of FTP and email. Stop breaking up files and start tracking their status. Increase the speed of transferring proposals, specs and more without sacrificing security.
Tags : 
cost effectiveness, efficiency, data sharing, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, encryption, efficiency, compliance
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
In just a few years, we’ve learned to rely on our phones for everything from banking to email to watching cat videos. Most importantly, it’s a safe bet your employees are using mobile devices for work-related activities as well – whether your IT department is prepared for it or not. The proliferation of internet devices makes it simply too easy for employees to check emails en route to the office or give a project that final once over from their couch at home. Smart businesses are already taking advantage of this trend, and reaping the benefits of productivity and employee satisfaction. Is yours?
Tags : 
mobility, productivity, employee satisfaction
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
Want to succeed more often as a small business owner, and take your enterprise to the next level? Consistently innovating and evolving business plans, marketing strategies, product lines, and even entire brand images is key to getting ahead in today’s fast-moving, hugely disruptive business world.
Tags : 
business innovation, marketing strategy, small business owner, branding
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
Known popularly as “Bring your own device”, or BYOD, the practice of working from personal devices is growing at a rapid pace.. And while security is real concern with BYOD, a recent survey found that employees are actually more cautious when using a personal device for work purposes
Tags : 
personal device, byod, survey
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Examine a few of the enterprise-level features that IT departments and administrators will look for in a file-sharing service. Some file-sharing services make the grade at a consumer level, but don’t offer the kinds of features that make a system workable for enterprise. An enterprise-level service should be able to balance its efficiency – a primary user concern – with the needs of a company’s IT department.
Tags : 
file sharing, consumer level, enterprise level, efficiency
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Data fuels workforce productivity. But corporate data typically resides in disparate silos spread across on-premises networks and cloud repositories. Knowledge workers are forced to repeatedly disrupt daily workflows to gather information from this data sprawl — a time-consuming and inefficient activity that diminishes productivity. They need a single point of access to all data sources, available from any device, where they can share and manipulate the content resources required to do their jobs.
Tags : 
sharefile, productivity, security, mobility, workflow
    
Citrix ShareFile
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management, data management, business technology, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management, data management, business technology, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jan 29, 2013
Client virtualization technologies properly matched to work styles provide an effective means of accelerating the BYOC program by allowing you to provide a standardized, well-managed desktop environment on employee-owned computers and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, it management, knowledge management, data management, business technology, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management, data management, business technology, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates several Citrix NetScaler ADC models vs. that of comparable products.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
At long last, datacenters have a more efficient high-availability deployment option for application delivery controllers. According to new research, that’s welcome news among IT leaders.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
Network, security and application personnel should evaluate ADCs based on how they integrate with key applications and cloud/virtualization platforms.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
In this white paper we will discuss: • Why data center limitations are restricting business agility. • How Cisco Application Centric Infrastructure (ACI) supports frequent changes in applications and infrastructure. • How Cisco and Citrix® have integrated NetScaler® with ACI to improve data center agility.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
This research identifies mainstream organizations that have achieved increased agility, cost savings and/or improved security using SDN-based technologies.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
If you’re ready to explore the advantages of SDN, and want to know how it should be implemented within your enterprise, start by reading our introductory whitepaper.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
Read this paper to learn how NetScaler is meeting modern demands for more robust datacenter security.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee