News

News

  • May 26, 2016 26 May'16

    Does IT have too many options for EMM tools?

    There are more EMM tools to choose from than ever, but many companies are still in the early stages of deciding how to manage mobile users. IT pros at Citrix Synergy 2016 explain.

  • May 25, 2016 25 May'16

    Citrix ShareFile adds information rights management

    The new information rights management feature in Citrix ShareFile helps manage and secure data, no matter where it lives.

  • May 24, 2016 24 May'16

    Citrix: 'We have not committed' to AppConfig

    LAS VEGAS -- Citrix is considering membership in the AppConfig Community but has not yet decided to join. That's the word from Manoj Raisinghani, vice president of product marketing for Citrix's ...

  • May 24, 2016 24 May'16

    Citrix previews new XenMobile features

    LAS VEGAS -- The big news with the latest version of XenMobile is its standalone MAM offering, but that's not all. Citrix has other capabilities in store for its enterprise mobility management ...

  • May 23, 2016 23 May'16

    IT sees benefits in standalone mobile app management

    Standalone mobile app management gives IT advantages around app wrapping, app-level encryption and controlling content of employees' devices not enrolled in MDM. Plus, it gives users more privacy.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • How to Use a Threat Intelligence Service

      The is a new breed of threat intelligence services but how can enterprise security teams use these capabilities to detect and mitigate targeted threats? See More

    • The New Breed of Threat Intelligence Services

      The focus of most cybersecurity organizations has shifted from mass attacks to unique threats that target specific industries, specific software applications or even specific enterprises. In the vast majority of cases, it takes too long to detect, analyze and mitigate these attacks. See More

    View All Sponsored News
  • May 13, 2016 13 May'16

    IT cheers new SharePoint mobile apps

    Microsoft's significant SharePoint makeover has IT pros praising the platform's new mobile apps and integration with OneDrive and other software.

  • May 11, 2016 11 May'16

    CEO wants to 'make Citrix great again'

    I’m going to let you in on a little secret: Even though the Q&A in every issue of this magazine is called Face Time, we don’t actually have face time with most of the subjects. In fact, the ...

  • May 11, 2016 11 May'16

    Mobile identity management gets a makeover

    Okta and Box expand their partnership to include mobile identity management and single sign-on capabilities. EMM vendors, such as MobileIron and VMware AirWatch, also get in on the game.

  • May 10, 2016 10 May'16

    Citrix CEO Kirill Tatarinov talks challenges, vision

    Citrix's new chief executive speaks on a future where Windows isn't the only game in town.

  • May 10, 2016 10 May'16

    IT pros awash with options for mobile certifications

    More mobile certifications are coming out of the woodwork, giving IT pros a chance to develop their skills in everything from EMM products to mobile strategy.

  • May 10, 2016 10 May'16

    IT shops make mobile centers of excellence a priority

    A mobile center of excellence makes mobility top line and puts all stakeholders within an organization on the same page.

  • May 06, 2016 06 May'16

    Apple-SAP deal gives enterprise developers new iOS SDK

    Apple and SAP agree to a deal similar to that of Apple and IBM's, where SAP will use its technologies to better enable iOS apps. The two companies will also help businesses build their own.

  • May 06, 2016 06 May'16

    BlackBerry, Citrix to join AppConfig Community

    Any successful effort to establish technology standards needs buy-in from all major stakeholders. The AppConfig Community, which aims to promote mobile application management standards, is about to ...

  • April 22, 2016 22 Apr'16

    IT pros confident in Apple iOS data protection, encryption

    Apple's enterprise security features draw praise from IT pros who say iOS data protection and encryption make the operating system a strong business platform.

  • April 18, 2016 18 Apr'16

    VMI security benefits could drive adoption, but roadblocks remain

    Virtual mobile infrastructure has yet to gain widespread adoption. It improves app and data security, but OS restrictions pose some problems.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close