Analysing compliance in the finance industry

If you work in the finance industry, you'll already be familiar with how 'tickbox' courses work. A set of slide titles down the side; a narration that more than likely just repeats what's written on the slides; an easy multiple choice question at some point to 'prove' that employees understand the course; and a metaphorical tick at the end. Well done, you've ticked off compliance.

But who is that helping - and is it even helping the employer? This whitepaper from Blackboard assesses best practice and ideas to achieve compliance in finance through cloud-based content and more. 

By Blackboard, 17 February 2017, 0 comments Categories: Cloud , Collaboration

Building a business case for an employee communications app

If you are putting together a communications mobile project, building a well thought-out business case to get executive and stakeholder buy-in is the most important step to your success.

This whitepaper from Sitrion examines the importance of internal communications to the strategic direction and success of your organisation, as well as providing a how-to guide to help make the business case for your employee communications app initiative.

By Sitrion, 18 January 2017, 0 comments Categories: Employee Education, Employees, Enterprise Mobility

The most powerful ways to have an impact on employee engagement

An engaged workforce is a critical component to the success of your company. When employees are engaged and behind your vision and strategy, they are more motivated and focused on your organisation’s business goals.

This whitepaper from Sitrion looks at the best practices for increasing employee engagement, and how mobile technology can play a pivotal role in internal communications.

By Sitrion, 18 January 2017, 0 comments Categories: Employee Education, Employees, Enterprise Mobility

The top five pitfalls to avoid in your data protection strategy

Done correctly, data protection is a critical differentiator for your business. Done poorly, it can be costly, waste valuable staff time, and hold the organisation back from meeting key service level agreements.

This whitepaper from Veritas outlines five critical pitfalls to avoid when building a successful data protection strategy for your organisation.

By Veritas, 15 September 2016, 0 comments Categories: Data & Analytics, Security

Examining the escalating threat of DDoS attacks

DDoS attacks have evolved into sophisticated multi-vector attacks at the network and application layers that can deplete resources very quickly and generate major service outages. Any enterprise and government organisation is at risk from the escalating threat of DDoS attacks. Download the White Paper from A10 to learn:

  • The evolution of DDoS attacks: more massive, more sophisticated, more devastating
  • How volumetric attacks target bandwidth and network components
  • How application attacks have become more complex and sophisticated
  • The elements you should consider for an efficient DDoS protection solution

By A10 Networks, 25 August 2016, 0 comments Categories: Data & Analytics, Data Loss, Security

Validating DDoS threat protection: Ensuring your solution works in real-world conditions

Multi-vector DDoS attacks are overwhelming traditional security solutions and as a result, existing DDoS defense strategies must be re-evaluated. New DDoS solutions require horsepower and capabilities to deal with the volume and complexity of simultaneous attacks.

Download this whitepaper, Validating DDoS Threat Protection, to learn:

  • Classification of DDoS attack types
  • An approach on how to effectively mitigate DDoS Attacks
  • The importance of Performance Validation to ensure predictable operations
  • How IXIA validated high performance by A10’s TPS DDoS mitigation solution

By A10 Networks, 25 August 2016, 0 comments Categories: Data & Analytics, Data Loss, Security

Digital trust nears breaking point - so what happens from here?

After weathering a rising tide of attacks and vulnerabilities, the Cost of Failed Trust Report, from Venafi and the Ponemon Institute, argues the digital trust that underpins most of the world's economy is nearing its breaking point - and there is no replacement in sight.

One of the key threats the paper outlines is the misuse of certificates used for enterprise mobility with applications such as Wi-Fi, VPN, and EMM. Download the paper to see the full research findings, and what can be done from here.

By Venafi, 19 July 2016, 0 comments Categories: Enterprise Mobility, Security

Why impending SHA-1 deadlines are impacting your business

(c) Moderc

The cyber security industry, audit organisations, technical experts, browser manufacturers, Microsoft, and standards organisations
agree: SHA-1 signed certificates need to be replaced.

This resource from Venafi outlines what needs to change, why it needs to change, and what this means for your business.

By Venafi, 06 July 2016, 0 comments Categories: Authentication, Security

How to successfully migrate from SHA-1 to SHA-2 encryption

Leading browsers are showing security warnings for sites that use SHA-1 based certificates that expire after January 1 2017, while code signed using SHA-1 from 2016 will no longer be trusted by Microsoft on the same date.

If your organisation hasn’t already migrated both internal and external SHA-1 certificates to SHA-2, it’s time to start .

This whitepaper from Venafi outlines a comprehensive seven step migration plan to help protect your business and your brand.

By Venafi, 06 July 2016, 0 comments Categories: Authentication, Security

Why IT is the new defender of customer anonymization

Back in 2013, the term data breach was hardly used. Now, it feels like it is the new normal – and it has major ramifications for your business from the IT department to the boardroom to your public-facing brand. With consumers increasingly wanting personalised customer experiences, what do you need to know to ensure you tread the fine line between a great customer journey and keeping data truly private?

This whitepaper from Jahia and Enterprise AppsTech looks at the ramifications for your company, your employees, and your brand.

By Jahia, 27 June 2016, 0 comments Categories: Data & Analytics, Privacy

You're already compromised: Exposing SSH as an attack vector

“We are living in a world without trust.” That’s the verdict from Gartner; it may be shocking, but given the trust Secure Shell (SSH) and other secure data communication technologies provides has been poisoned so frequently, it may not be that much of a surprise.

This whitepaper from Venafi looks at SSH, the best and worst practices, and implementing strategies to mitigate attacks on SSH.

By Venafi, 22 June 2016, 0 comments Categories: Security

Welcome to Workforce 3.0: The changing landscape of employee learning and development

The biggest problem facing the workforce is not a lack of people – but a shortage of skills. With 51% of employees not engaged at work according to new research – and 17.5% being actively disengaged – as well as a plethora of workplace areas and devices, employee learning and development has never been more critical.

This whitepaper from Brightspace examines key best practices for employee learning, motivation, and engagement.

By Brightspace, 28 April 2016, 0 comments Categories: Employee Education, Employees

The best practices for increasing employee engagement

An engaged workforce is a critical component to your company’s success. Yet employee engagement is a long-term game and it starts by addressing the needs of your people. This whitepaper download from Sitrion discusses how to reach all employees, provides context, and offers the most powerful methods which have an impact on employee engagement.


By Sitrion, 21 March 2016, 0 comments Categories: Employee Education, Employees

The CIO view of cybersecurity

As organisations layer security controls to protect their business, 90% of CIOs admit to wasting millions on inadequate cybersecurity. Why is this? This resource, from Venafi, explores the fundamental flaws in cybersecurity strategies, and how organisations can bypass the bad guys.


By Venafi, 01 March 2016, 0 comments Categories: CIO, Enterprise Mobility, Security

APIs and the enterprise: Design best practices

APIs themselves are not new - but what is new is the rise and dramatic proliferation of lightweight public APIs, and the rapid expansion of these into enterprise applications. As an architect, it is important to understand and be able to resolve the unique challenges inherent both in building composite applications and in deploying APIs for public consumption, as this whitepaper from Accenture and Red Hat explains.

By Red Hat, 29 January 2016, 0 comments Categories: Development

DevOps and open source: Lessons learned from early adopters

DevOps is becoming increasingly important in enterprise strategy as organisations look to it for greater cost savings and efficiency. This whitepaper from IDC and Red Hat looks at the key drivers, the technologies expected to enable DevOps in the coming two years, and lessons learned from early adopters.

By Red Hat, 29 January 2016, 0 comments Categories: Development

Empowering mobile productivity

Today’s workers are mobile. They need to be connected to their corporate network or cloud-based applications around the clock and around the world – anytime, anywhere. But enabling basic connectivity across, smartphones, tablets, as well as 3G- and 4G-enabled laptops, can be a daunting challenge.

This resource from Pulse Secure explains how fast, easy, secure access from multiple devices can be achieved through enterprise networks and the cloud to empower mobile productivity.

By Pulse Secure, 19 January 2016, 0 comments Categories: Enterprise Mobility, Mobile, Productivity

The changing landscape of employee learning and development

This eBook will explore the shifting landscape of corporate learning and development. Specifically, we’ll explore the rapidly changing dynamics of the corporate workplace, investigate the learning needs, desires and demands of tomorrow’s workforce, and examine the emerging tools, technologies and methods that aim to meet these new demands.

By Brightspace, 15 December 2015, 0 comments Categories: Employee Education, Employees

How business and IT can work more effectively through collaboration

To succeed in such a rapidly changing environment, businesses must be agile. They must respond quickly as markets, customer needs and even regulations change faster than ever before. However for many organisations the path to agile operations is fraught with challenges; chief among those being a long-standing disconnect between the business units that hold the profit and loss for product lines, and the IT departments that deliver the applications upon which the business depends.

This whitepaper from Application Development Trends and Red Hat discusses how to bring IT and business together, how collaboration can help and outlines the important questions that need answering for developers.

By Red Hat, 28 October 2015, 0 comments Categories: Applications, Development, Enterprise Mobility

Insight report: Assessing the enterprise OS landscape for CIOs and developers

The consumerisation of IT and the proliferation of BYOD – not to forget the COBO (corporate owned, business only) device market either – means that your company probably has more mobile devices than desktops and laptops. The decision for your enterprise operating system of choice, however, is an important one. With this in mind, Enterprise AppsTech presents its latest insight report, in association with Zebra Technologies, on the enterprise operating system landscape outside of iOS.

By Enterprise AppsTech, 23 October 2015, 0 comments Categories: Android, Enterprise Mobility

Beyond the mobile business: Getting the best of both worlds

Mobile apps are becoming an essential part of business, boosting efficiency and productivity, as well as staff morale and customer satisfaction. Yet many corporate IT teams developing mobile apps are short of time, money, and skills.

Creating a useful and useable mobile application means identifying and understanding what users need from your online service in a mobile context. This whitepaper from Globo outlines the different perspective that is required today.

By Globo, 19 October 2015, 0 comments Categories: Applications, Enterprise Mobility

How mobile will drive internal communications success

Internal communications is a critical component to your company’s success. You need to think about the role of internal communications more strategically than ever before, to align your employees behind your vision, your strategy, and to drive daily productivity.

Mobile technology is the most direct means to reaching all your employees. This whitepaper from Sitrion shows how you can tap into all the devices in your organisation to reach every individual employee and help them be informed, productive, and to enjoy their work.

By Sitrion, 15 October 2015, 0 comments Categories: Collaboration, Employees, Enterprise Mobility

Wearables: A new frontier for businesses

Opportunities in wearable devices are going beyond fitness to the workplace. More firms are looking to wearables as a new way to boost efficiency, increase effectiveness, and speed up operations. Yet a unique set of challenges come along when designing wearables to suit the workplace. This whitepaper from Globo assesses the key challenges and opportunities.

By Globo, 09 October 2015, 0 comments Categories: Enterprise Mobility, Wearables

The five key forces shaping the next generation of enterprise mobility

Mobile apps are creating a higher return on investment than ever before for enterprises. However, a number of challenges slow down the speed of enterprise mobile adoption.

This whitepaper from Telerik provides a detailed view of the five major factors in enterprise mobility: security; investment costs; mobilising existing data; cloud; and multi-platform mobile development.

By Telerik, 09 October 2015, 0 comments Categories: Enterprise Mobility

The five critical steps to securely manage mobile apps and devices

Mobile adoption at work is mainstream, from the casual user who wants to check business email on their mobile phone, to the field technician who is carrying a mobile tablet to the customer site. This presents both a formidable challenge and a tremendous opportunity for businesses that want to benefit from mobility.

This whitepaper from Good Technology outlines the five critical steps that will put your mobility strategy on the path to success.

By Good Technology, 26 August 2015, 0 comments Categories: Applications, Enterprise Mobility, Security

The five questions business managers need to talk to IT about faster enterprise mobility

In a business context, the mobile industry is still in its infancy. Even with the consumerisation of IT, enterprise mobility has a way to go to catch up to the robust productivity capabilities of the consumer world. So how do you get there? Do you build? Do you buy? Do you wait? If you’re looking to build enterprise apps, then be aware you’re putting more strain on your already overworked IT department. To make sure everyone gets what they want, this whitepaper outlines the five questions you need to know the answers to before you visit IT.

By Sitrion, 02 July 2015, 0 comments Categories: Collaboration, Enterprise Mobility, Productivity

Future proofing your business: UCaaS and mobility

Against the backdrop of a changing workforce that will increasingly expect to operate in mobile-first environments, the challenge for businesses today is to decide how to address these expectations. Find out how with this whitepaper from Thinking Phones.

By Thinking Phones, 29 May 2015, 0 comments Categories: Enterprise Mobility

Insight report: The importance of rapid mobile app development in enterprise mobility

For CIOs worldwide, the pressure of ensuring employees keep up to date with technology and one step ahead with business is onerous. Increasingly, the thrust is on applications, rather than devices, to be the game changer. But as application uptake continues to soar, the time taken to develop each app needs to decrease – otherwise there will be an imbroglio between line of business and IT.

In this exclusive insight report from Enterprise AppsTech, in association with Sitrion, we examine the basics of rapid mobile app development (RMAD), how it aligns IT and business departments, and what you need to do next.

By Enterprise AppsTech, 26 May 2015, 0 comments Categories: Applications, Development, Enterprise Mobility

Mobile Moments of Productivity eBook: Easy Approval Processes

It seems to be a universal truth that simple day-to-day tasks tend to be overly timeconsuming – particularly managing approvals. As a manager, you are frustrated with the time it takes to access multiple, complex applications using multiple logins that may or may not have multiple mobile apps that clutter up your mobile device. It seems like a never ending battle.

This eBook explores ways to reduce the burden of daily, inefficient approval processes in order to make faster, smarter decisions and ultimately increasing employee productivity across your organization.

By Sitrion, 18 February 2015, 0 comments Categories: Applications, Enterprise Mobility, Mobile

Sitrion Success Story: Illinois Brick Company

Sitrion and SPR Consulting deliver an enterprise mobile access solution to deliver SAP information to sales reps on their handheld devices.

“We selected SPR Consulting and Sitrion to help us meet our goals because they brought their depth of expertise with SAP and mobility without the hefty price we were being quoted by other solution providers,” said Scott Braafhart, IT Director at Illinois Brick Company. “They not only delivered a solution for the long term, but they also provided us with high-quality mobile access very quickly to help us be highly competitive.”

By Sitrion, 13 February 2015, 0 comments Categories: Case Studies

Mobile apps for the enterprise

You don’t need anyone to tell you that mobility is critical to enterprise productivity, collaboration and profitability. You realize, too, that the strategic, long-term value in mobility lies in applications. Desktop apps (like Sharepoint, LiveLink and SAP) where data resides behind the corporate firewall, have been driving business for years now, and making those apps move – literally – is where it’s at.

By BlackBerry, 14 January 2015, 0 comments Categories: App Platforms, BlackBerry, Enterprise Mobility, Mobile

The 10 tenets of BYOD wisdom

It's happening. Fast. IT departments can't do much to stop BYOD even if they want to, so it is now an issue of managing it, with security of the company network and data resources the biggest concerns. This resource from Sprint assesses the landscape and gives 10 solid pieces of advice as to how to set up a BYOD program correctly.

By Sprint, 11 August 2014, 0 comments Categories: BYOD

Winning mobile strategies: How to build value in the enterprise

The decision to go mobile invokes many challenges. Mobile technology can be liberating, but only if you marry it to the needs of your business. With development and deployment gaining pace, this whitepaper from ShinobiControls seeks to outline the two strategies to consider when enabling mobile technology across the enterprise.

By ShinobiControls, 24 June 2014, 0 comments Categories: Enterprise Mobility