Your Search returned 2 results from our Editorial content

Sort By

IT COMPLIANCE

Africa: 6 years of ICT recycling

We investigate the eWaste and ICT situation across Africa

DATA MINING

Tableau folds Splunk data into business analysis

Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed...

   
   

Your Search returned 79 results from our White Paper Library

Sort By
CA Technologies

Mainframe Servers

Mainframe 2.0 Initiative Supports Consolidated Management...

This IDC White Paper analyzes CA's Mainframe 2.0 initiative — a combined development, integration, and packaging strategy for the company's mainframe management...


SAP

Regulatory Compliance

Foundations of GRC: Streamlining Compliance

Learn how to develop a streamlined compliance solution to maintain sustainability, consistency, efficiency, transparency and accountability.


Informatica

Security

Dynamic Data Masking

In this video you will learn how dynamic data masking can help your organization comply with various privacy regulations. Discover an end-to-end solution...


ForeScout

Network Management

The Pragmatic Path to Achieving NAC Results

This EMA white paper offers essential implementation, process and control considerations for achieving network access control (NAC). Discover more about...


Symantec Corporation

Security

Three Keys To Cost-Effective Security For Your Small Business...

Just because SMBs don’t have the same kind of resources as large enterprises doesn’t mean they have to lack adequate protection. This e-book provides three...


McAfee

Data Privacy and Security

Protecting Databases: Boosting Security Against Today’s...

Every organization relies on a database for its operations. Find out how you can boost the security of yours against today’s attacks and loss vectors....


McAfee

Master Data Management

McAfee Total Protection for Data Loss Prevention

It’s impossible for IT to identify all of a companies’ sensitive data, interpret the regulations, and translate them into effective policies. This white...


Fortinet

Wi-Fi

Fortinet Unified Access Layer Architecture

The increasing popularity of mobile devices and the need for cost reduction are driving Wireless LAN (WLAN) adoption. But security can a difficult beast...


McAfee

Risk Management

Manage Security And Risk

Risk was once a fairly static concept. Now that once static risk picture fluctuates like a kaleidoscope. This white paper from McAfee outlines risk management...


Previous 1 3 4 5 6 7 8

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What you need to know about cryptocurrencies

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?