Your Search returned 1 results from our Editorial content

Sort By


A look into authentication for the day after passwords

How enterprises can take new steps in two-factor authentication (& finally kill passwords)


Your Search returned 58 results from our White Paper Library

Sort By
Admit One Security


Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


Internet Security

Akamai Security Capabilities Whitepaper

This whitepaper explains how Akamai helps organizations bolster the security of their Web-based assets, with capabilities ranging across the application,...

CA Technologies


Advanced Authentication Methods: Software vs Hardware

Join this on-demand webcast to learn about the advanced authentication methods available today. The webcast discusses both hardware and software and makes...

Quest Software

High Availability

Ensuring High Availability for Active Directory

In this Quest white paper, learn to identify the symptoms of AD problems, how to protect its stability and reliability and the best options for recovery...

Sterling Software

Infrastructure Management

The eGuide to Data Movement and Governance

Data must follow strict guidelines as it moves in and out of your company. The purpose of this eGuide is to help you grasp the measures that can keep your...


Application Performance Management (APM)

Fast, Secure Access to VDI Applications: The Role of Automated...

While virtual desktops offer many benefits, too many steps to access them negates any advantages. Find out how automated VDI Access can help improve both...


Mobile Working

Mobility Helps Enterprises Enter A New Age

This Forrester paper looks at how Mobility is empowering enterprises and how mobile security is becoming less restrictive for users.

Symantec Corporation


Your Guide for Migrating from 1024-bit to stronger SSL certificate...

This guide aims to help educate and inform users of TLS/SSL certificates about the upcoming change in key lengths and tips on managing their transition...

Previous 1 3 4 5 6

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?