citrix

Results 1 - 25 of 607Sort Results By: Published Date | Title | Company Name
Published By: Citrix     Published Date: Jul 25, 2014
This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.
Tags : 
citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
Citrix
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To unlock the full potential of enterprise mobility, IT needs to allow people the freedom to access all their apps and data from any device, seamlessly and conveniently. White paper attached
Tags : 
citrix, mobility, security, data
    
Citrix Systems, Inc.
Published By: Citrix     Published Date: Jun 03, 2015
Download this paper now to discover ten ways to grow your business with webinars.
Tags : 
weinars, use webinars to grow your business, how to grow your business, customer interaction, share information, communication, tips for using webinars
    
Citrix
Published By: Citrix     Published Date: Nov 20, 2012
"The best way to get better at online meetings is to participate in more of them." This brief by Gihan Perera, founder of First Step Communications, provides 10 practical tips for keeping control of your online meetings.
Tags : 
10 tips, online meeting, citrix, virtual meeting, collaboration, enterprise applications, business technology
    
Citrix
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Groupís second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact ITís ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense
    
Citrix Systems, Inc.
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Groupís second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Groupís second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the ď2015 Cyberthreat Defense Report.Ē
Tags : 
citrix, cyberthreat, infographic, 2015 report
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : 
citrix, cyberthreat defense, report, 2015
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendorsí enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management, mobility
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader.
Tags : 
citrix, gartner, magic quadrant, enterprise, mobility, business technology
    
Citrix Systems, Inc.
Published By: Citrix Systems     Published Date: Jul 25, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2016.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
Get an overview of the cyberthreat landscape and see key findings from the ď2016 Cyberthreat Defense Report.Ē
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : 
mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience, deliver, access, app, cost, management, it management, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2015
When evaluating which app and desktop virtualization solution you should adopt, it is important to start your comparison using information you can trust. Learn how 3 companies benefited from true mobility and IT efficiency with Citrix Desktop Virtualization.
Tags : 
citrix, desktop virtualization, vmware, efficiency, virtualization, mobile computing
    
Citrix Systems
Published By: GoToWebinar     Published Date: Oct 08, 2013
There are a few simple things you can do before, during and after a webinar that will leave your attendees talking for days. If you want to have a lively event, get the conversation started early. This brief provides an easy step-by-step guide that will make your online event more engaging, valuable and effective.
Tags : 
citirx, whitepaper, go to webinar, citrix, webinar preparation
    
GoToWebinar
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesnít provide adequate digital collaboration tools, your employees are likely to use their own Ė potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesnít provide adequate digital collaboration tools, your employees are likely to use their own Ė potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Published By: Citrix Systems     Published Date: Jul 17, 2015
Never refresh your PC again.
Tags : 
data, cloud, operations, desktop management, energy efficiency, reduced cost, application
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 17, 2015
There was once a time that PC refresh cycles were an unavoidable fact of life. But desktop virtualization paired with client computing lets IT escape costly PC refresh cycles while simplifying management, security and monitoring.
Tags : 
refresh cycle, security, monitoring, it management, data management, business technology
    
Citrix Systems
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : 
client relations, efficiency, file sharing, data tracking
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: GoToWebinar     Published Date: Oct 08, 2013
We've all grown used to ordinary customer experiences, so when something extraordinary happens, we pay attention. No matter whether your business is a one-person show just getting started or a multi-national corporation, whether you are a front-line worker or a top-level executive, you can create awesome. This brief by Scott Stratten, best-selling author and president of UnMarketing, shares stories thatíll inspire you to find your own unique brand of business awesome.
Tags : 
marketing, scott stratten, good to awesome, citrix, go to meeting, the book of business awesome
    
GoToWebinar
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee