Your Search returned 1 results from our Editorial content

Sort By


Can a Raspberry Pi be used as enterprise-grade endpoint...

Travis Smith, Senior Researcher at Tripwire, talks cheap and easy IoT security.


Your Search returned 159 results from our White Paper Library

Sort By

Endpoint Security

Does Device Sprawl Threaten Your Data?: Reducing data loss...

According to McAfee’s 2009 Unsecured Economies report, companies lost $1 trillion worldwide because of data loss, both malicious and accidental.

Cloud Computing Platforms

Next Generation of Web Exploits: When Good Sites Go Bad...

Download this FREE whitepaper to find out about the latest generation of Web attacks and what you can do to protect your organization.

Symantec Corporation

Endpoint Security

Endpoint Data Protection Buyer's Guide

This guide can help your organization evaluate risks to data at the endpoints. It includes a checklist for selecting the right endpoint encryption solution...

Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (, a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...

Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....


Anti-Virus Solutions

Endpoint Security: Anti-Virus Alone is Not Enough

This report provides insight into endpoint security and anti-virus deployment, and explores whether anti-virus solutions may mislead some organizations...

IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...


Reporting and End-User Query Tools

End User Experience Management Industry Brief: Top 10 Myths...

Understand why standard APM technology is simply not capable of sufficiently addressing EUE management challenges. Review the top 10 myths associated with...


Endpoint Security

A Buyer's Guide to Endpoint Protection Platforms

This Gartner paper acts as buyer's guide to endpoint protection platforms, listing the most advanced features to help buyers differentiate solutions.


Microsoft Windows

Corporate Av/Epp Comparative Analysis: Exploit Protection...

This paper tests 11 enterprise level Endpoint protection (EPP) products to measure their effectiveness in protecting Windows computers against exploits....

Previous 1 3 4 5 15 16

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?