Your Search returned 1 results from our Editorial content

Sort By
  • Close-button

    Enterprise Data Privacy


BlueTalon CEO sees sharp need for data-centric security...

Enterprise IT veteran Eric Tilenius believes the days of focusing exclusively on endpoint and perimeter controls are gone


Your Search returned 60 results from our White Paper Library

Sort By
  • Close-button

    Enterprise Data Privacy


Patch Management

Closing the Window of Exposure with Database Virtual Patching...

IT organizations are searching for a more efficient approach that enables quicker deployment of security patches while ensuring the safety and productivity...


Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.

Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.


Enterprise Application Integration (EAI)

Manage enterprise data with Integrated Data Management

To successfully harness organizational data to business goals and manage data and data-driven applications so they deliver business value, enterprises...


Data Privacy and Security

Closing the Data Privacy Gap: Protecting Sensitive Data...

The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These...


Data Privacy and Security

Forrester – Test Data Privacy is Critical to Meet Compliances...

Just because data is stored in a test or development environment does not release your firm from the responsibility to comply with privacy regulations....


Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


Cloud Computing Security

Leveraging Cloud Security to Weather Threatening Storms...

This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving,...


Systems Integration

Securing Your Cloud Based Data Integration - A Best Practices...

This paper identifies a five item checklist covering security related topics that need to be addressed during data integration to the cloud.

Previous 1 3 4 5 6

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?