Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Intrusion Detection and Prevention

   

Your Search returned 28 results from our White Paper Library

Sort By
  • Close-button

    Intrusion Detection and Prevention

McAfee

Intrusion Detection and Prevention

The Total Economic Impact™ Of McAfee’s Network Security...

In May 2009, McAfee, Inc., commissioned Forrester Research to examine the financial impact and potential return on investment (ROI) that an organization...


IBM

Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


Akamai

Internet Security

Akamai Security Capabilities Whitepaper

This whitepaper explains how Akamai helps organizations bolster the security of their Web-based assets, with capabilities ranging across the application,...


Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (www.treehouseintheglen.com), a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...


Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....


Blue Coat

BYOD (Bring Your Own Device)

Solution Brief: Top Five Considerations for a BYOD Policy...

Though BYOD offers a new way of working and a host of benefits, it also presents a swathe of new security issues. See the top five considerations for a...


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

Readiness Assessments: Vital to Secure Mobility

See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.


Symantec Corporation

Endpoint Security

Gartner Magic Quadrant for Endpoint Protection Platforms...

Read this report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.


SSH Communications Security

Enterprise Data Privacy

Preventing Data Loss Through Privileged Access Channels...

This white paper focuses on how organizations facing these issues of privileged access can effectively balance cost, risk and compliance.


Blue Coat

Threat and Vulnerability Management

Security Analytics Moves to Real-Time Protection

Discover the advantages of real-time threat scanning on an analytics platform.


Previous 1 3

Recommended for You

silhouette

Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you

kathryn-cave

The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech

phil-muncaster

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?