Your Search returned 1 results from our Editorial content

Sort By
  • Close-button

    Enterprise Data Privacy

ENTERPRISE DATA PRIVACY

BlueTalon CEO sees sharp need for data-centric security...

Enterprise IT veteran Eric Tilenius believes the days of focusing exclusively on endpoint and perimeter controls are gone

   

Your Search returned 53 results from our White Paper Library

Sort By
  • Close-button

    Enterprise Data Privacy

Imperva

Patch Management

Closing the Window of Exposure with Database Virtual Patching...

IT organizations are searching for a more efficient approach that enables quicker deployment of security patches while ensuring the safety and productivity...


Imperva

Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.


Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.


IBM

Enterprise Application Integration (EAI)

Manage enterprise data with Integrated Data Management

To successfully harness organizational data to business goals and manage data and data-driven applications so they deliver business value, enterprises...


IBM

Data Privacy and Security

Closing the Data Privacy Gap: Protecting Sensitive Data...

The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These...


IBM

Data Privacy and Security

Forrester – Test Data Privacy is Critical to Meet Compliances...

Just because data is stored in a test or development environment does not release your firm from the responsibility to comply with privacy regulations....


BlackBerry

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


BlackBerry

Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


Akamai

Cloud Computing Security

Leveraging Cloud Security to Weather Threatening Storms...

This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving,...


Informatica

Systems Integration

Securing Your Cloud Based Data Integration - A Best Practices...

This paper identifies a five item checklist covering security related topics that need to be addressed during data integration to the cloud.


Previous 1 3 4 5 6

Blogs

adrian-schofield

South African ICT

The thorny issue of internet freedom across Africa

Adrian Schofield sheds light on tech in South Africa

martin-veitch-thumbnail

My day in the Jeff Bezos and Amazon forest

Martin Veitch's inside track on today’s tech trends

phil-muncaster

China Rising

Why WannaCry might make Microsoft cry in China

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should we donate our health data the same way we donate organs?