RSS feed Get our RSS feed

News by Topic

citrix

Results 76 - 100 of 647Sort Results By: Published Date | Title | Company Name
By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, encryption, efficiency, compliance
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 24, 2017
In just a few years, we’ve learned to rely on our phones for everything from banking to email to watching cat videos. Most importantly, it’s a safe bet your employees are using mobile devices for work-related activities as well – whether your IT department is prepared for it or not. The proliferation of internet devices makes it simply too easy for employees to check emails en route to the office or give a project that final once over from their couch at home. Smart businesses are already taking advantage of this trend, and reaping the benefits of productivity and employee satisfaction. Is yours?
Tags : mobility, productivity, employee satisfaction
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 24, 2017
Want to succeed more often as a small business owner, and take your enterprise to the next level? Consistently innovating and evolving business plans, marketing strategies, product lines, and even entire brand images is key to getting ahead in today’s fast-moving, hugely disruptive business world.
Tags : business innovation, marketing strategy, small business owner, branding
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 24, 2017
Known popularly as “Bring your own device”, or BYOD, the practice of working from personal devices is growing at a rapid pace.. And while security is real concern with BYOD, a recent survey found that employees are actually more cautious when using a personal device for work purposes
Tags : personal device, byod, survey
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : data loss, security, file sharing, mobile workforce
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jun 12, 2017
Examine a few of the enterprise-level features that IT departments and administrators will look for in a file-sharing service. Some file-sharing services make the grade at a consumer level, but don’t offer the kinds of features that make a system workable for enterprise. An enterprise-level service should be able to balance its efficiency – a primary user concern – with the needs of a company’s IT department.
Tags : file sharing, consumer level, enterprise level, efficiency
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jun 12, 2017
Data fuels workforce productivity. But corporate data typically resides in disparate silos spread across on-premises networks and cloud repositories. Knowledge workers are forced to repeatedly disrupt daily workflows to gather information from this data sprawl — a time-consuming and inefficient activity that diminishes productivity. They need a single point of access to all data sources, available from any device, where they can share and manipulate the content resources required to do their jobs.
Tags : sharefile, productivity, security, mobility, workflow
     Citrix ShareFile
By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: Citrix Systems     Published Date: Jan 29, 2013
Client virtualization technologies properly matched to work styles provide an effective means of accelerating the BYOC program by allowing you to provide a standardized, well-managed desktop environment on employee-owned computers and more.
Tags : ipad, android, tablet, mobility, byo, smartphone
     Citrix Systems
By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates several Citrix NetScaler ADC models vs. that of comparable products.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
At long last, datacenters have a more efficient high-availability deployment option for application delivery controllers. According to new research, that’s welcome news among IT leaders.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
Network, security and application personnel should evaluate ADCs based on how they integrate with key applications and cloud/virtualization platforms.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
In this white paper we will discuss: • Why data center limitations are restricting business agility. • How Cisco Application Centric Infrastructure (ACI) supports frequent changes in applications and infrastructure. • How Cisco and Citrix® have integrated NetScaler® with ACI to improve data center agility.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
This research identifies mainstream organizations that have achieved increased agility, cost savings and/or improved security using SDN-based technologies.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
If you’re ready to explore the advantages of SDN, and want to know how it should be implemented within your enterprise, start by reading our introductory whitepaper.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
Read this paper to learn how NetScaler is meeting modern demands for more robust datacenter security.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
As the transition to cloud-based data centers marches on, it is becoming apparent that organizations need to keep going after they virtualize their server, storage and switching infrastructure.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
Learn more on the challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
     Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics