Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Intrusion Detection and Prevention


Your Search returned 33 results from our White Paper Library

Sort By
  • Close-button

    Intrusion Detection and Prevention


Intrusion Detection and Prevention

The Total Economic Impact™ Of McAfee’s Network Security...

In May 2009, McAfee, Inc., commissioned Forrester Research to examine the financial impact and potential return on investment (ROI) that an organization...


Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


Internet Security

Akamai Security Capabilities Whitepaper

This whitepaper explains how Akamai helps organizations bolster the security of their Web-based assets, with capabilities ranging across the application,...

Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (, a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...

Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....

Blue Coat

BYOD (Bring Your Own Device)

Solution Brief: Top Five Considerations for a BYOD Policy...

Though BYOD offers a new way of working and a host of benefits, it also presents a swathe of new security issues. See the top five considerations for a...

Cisco Systems, Inc.

BYOD (Bring Your Own Device)

Readiness Assessments: Vital to Secure Mobility

See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.

Symantec Corporation

Endpoint Security

Gartner Magic Quadrant for Endpoint Protection Platforms...

Read this report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.

SSH Communications Security

Enterprise Data Privacy

Preventing Data Loss Through Privileged Access Channels...

This white paper focuses on how organizations facing these issues of privileged access can effectively balance cost, risk and compliance.

Blue Coat

Threat and Vulnerability Management

Security Analytics Moves to Real-Time Protection

Discover the advantages of real-time threat scanning on an analytics platform.

Previous 1 3 4

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?