Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

Contextual access to apps and data anywhere, any time, on any device

Citrix provides the power of contextual access which allows IT to set policies for who can access data based on location, device and network. Watch this video and we’ll show you how.

Maintain control of documents and files you share with others

It's something we do all the time. Sending a file to someone else, sharing data. But what happens when you press send on that email? The file attachment is gone and out of of your control. You have no idea where it could end up, or who could access it. That's where Citrix ShareFile can help. Watch this video and we’ll show you how.

Video/Webcast | Presented by KnowBe4

On-Demand Webinar: Phishing Attack Landscape and Industry Benchmarking

One of your important and ongoing IT security initiatives is getting the Phish-prone percentage of your users as low as possible. But how are you doing compared to the "similar-size peers" in your industry?

Video/Webcast | Presented by KnowBe4

Phishing and Social Engineering in 2018: Is the Worst Yet to Come?

Get a jump start on the year ahead in cybercrime. Join security expert and CEO at KnowBe4, Stu Sjouwerman, for this 30-minute webinar "Phishing and Social Engineering in 2018: Is the Worst Yet to Come?". Stu will discuss some of the latest trends in cybercrime and give you an insider's perspective on what to expect for 2018 and how to prepare for it.

Video/Webcast | Presented by KnowBe4

Phishing and Social Engineering in 2018: Is the Worst Yet to Come?

Get a jump start on the year ahead in cybercrime. Join security expert and CEO at KnowBe4, Stu Sjouwerman, for this 30-minute webinar "Phishing and Social Engineering in 2018: Is the Worst Yet to Come?". Stu will discuss some of the latest trends in cybercrime and give you an insider's perspective on what to expect for 2018 and how to prepare for it.

Recover from malware and ransomware

Cybersecurity - it's top of mind for every organization. When it comes to providing SECURE access to desktops, applications and data Citrix can help. Watch this video and we'll show you how.

Securely deliver apps and desktops to any enterprise, from any cloud

How do you securely deliver applications, data, and desktops to workers, without putting your intellectual property at risk? Can you leverage cloud resources like Office 365 and Azure AD? Absolutely. And Citrix brings it all together, with security being top of mind. Watch this video and we’ll show you how.

Accelerating Artificial Intelligence: Best Practices for Deep Learning Architectures

Define the challenges & best practices in designing infrastructure solutions for artificial intelligence, deep learning & machine learning.

NCC Media Chooses Dell EMC Isilon and Hortonworks Data Platform for Their Data Lake

With analytics based on Dell EMC Isilon, NCC Media extends advertising that provide greater value and drive deeper insights

On-Demand Webinar: How APIs Are Transforming Large Enterprises

In this webinar, we'll explore: Real-world examples of how and why large, traditional businesses are adopting APIs Key roles of APIs in the modern digital enterprise Consideration criteria for designing a well-rounded, comprehensive API strategy

Load More