Your Search returned 1 results from our Editorial content

Sort By

AUTHENTICATION

A look into authentication for the day after passwords

How enterprises can take new steps in two-factor authentication (& finally kill passwords)

   

Your Search returned 55 results from our White Paper Library

Sort By
Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


BlackBerry

Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


Akamai

Internet Security

Akamai Security Capabilities Whitepaper

This whitepaper explains how Akamai helps organizations bolster the security of their Web-based assets, with capabilities ranging across the application,...


CA Technologies

Security

Advanced Authentication Methods: Software vs Hardware

Join this on-demand webcast to learn about the advanced authentication methods available today. The webcast discusses both hardware and software and makes...


Quest Software

High Availability

Ensuring High Availability for Active Directory

In this Quest white paper, learn to identify the symptoms of AD problems, how to protect its stability and reliability and the best options for recovery...


Sterling Software

Infrastructure Management

The eGuide to Data Movement and Governance

Data must follow strict guidelines as it moves in and out of your company. The purpose of this eGuide is to help you grasp the measures that can keep your...


VMware

Application Performance Management (APM)

Fast, Secure Access to VDI Applications: The Role of Automated...

While virtual desktops offer many benefits, too many steps to access them negates any advantages. Find out how automated VDI Access can help improve both...


Entrust

Mobile Working

Mobility Helps Enterprises Enter A New Age

This Forrester paper looks at how Mobility is empowering enterprises and how mobile security is becoming less restrictive for users.


Symantec Corporation

SSL

Your Guide for Migrating from 1024-bit to stronger SSL certificate...

This guide aims to help educate and inform users of TLS/SSL certificates about the upcoming change in key lengths and tips on managing their transition...


Previous 1 3 4 5 6

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

Blockchain For Dummies: What you really need to know

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?