Your Search returned 1 results from our Editorial content

Sort By


Ethiopia: From Solomon to Big Data

Today Addis Ababa is the seat of the African union, base for the Economic Commission for Africa and often referred to as "the political capital” of Africa. But looking...


Your Search returned 102 results from our White Paper Library

Sort By

Master Data Management

Making Strategy Real

In today's competitive global business environment virtually all firms work diligently to analyze alternatives and to create a business strategy that enables...


Master Data Management

Managing Enterprise Information: Architecting for Survival...

Information is not always the first word that comes to mind when executives think about survival strategies. Yet according to the acclaimed business strategist...


Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.

Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.



Five Steps to Successful IT Consolidation

Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful.



Gartner: The Structure and Scope of an Effective Information...

This Gartner research paper can help you build an effective information security program in your organization. Learn how to drive security through all...

Symantec Corporation

Endpoint Security

Endpoint Data Protection Buyer's Guide

This guide can help your organization evaluate risks to data at the endpoints. It includes a checklist for selecting the right endpoint encryption solution...

CA Technologies

Risk Management

Defending Against Insider Threats to Reduce your IT Risk...

This paper explains why your organization should take steps to prevent insider thefts and malicious attacks. Read now and learn a proactive approach to...

Previous 1 3 4 5 10 11

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?