Your Search returned 1 results from our Editorial content

Sort By

STATISTICAL DATA ANALYSIS

Ethiopia: From Solomon to Big Data

Today Addis Ababa is the seat of the African union, base for the Economic Commission for Africa and often referred to as "the political capital” of Africa. But looking...

   

Your Search returned 84 results from our White Paper Library

Sort By
SAP

Master Data Management

Making Strategy Real

In today's competitive global business environment virtually all firms work diligently to analyze alternatives and to create a business strategy that enables...


SAP

Master Data Management

Managing Enterprise Information: Architecting for Survival...

Information is not always the first word that comes to mind when executives think about survival strategies. Yet according to the acclaimed business strategist...


Imperva

Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.


Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.


Riverbed

Virtualization

Five Steps to Successful IT Consolidation

Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful.


Imperva

Security

Gartner: The Structure and Scope of an Effective Information...

This Gartner research paper can help you build an effective information security program in your organization. Learn how to drive security through all...


Symantec Corporation

Endpoint Security

Endpoint Data Protection Buyer's Guide

This guide can help your organization evaluate risks to data at the endpoints. It includes a checklist for selecting the right endpoint encryption solution...


CA Technologies

Risk Management

Defending Against Insider Threats to Reduce your IT Risk...

This paper explains why your organization should take steps to prevent insider thefts and malicious attacks. Read now and learn a proactive approach to...


Previous 1 3 4 5 8 9

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?