Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Intrusion Detection and Prevention

   

Your Search returned 30 results from our White Paper Library

Sort By
  • Close-button

    Intrusion Detection and Prevention

McAfee

Intrusion Detection and Prevention

The Total Economic Impact™ Of McAfee’s Network Security...

In May 2009, McAfee, Inc., commissioned Forrester Research to examine the financial impact and potential return on investment (ROI) that an organization...


IBM

Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


Akamai

Internet Security

Akamai Security Capabilities Whitepaper

This whitepaper explains how Akamai helps organizations bolster the security of their Web-based assets, with capabilities ranging across the application,...


Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (www.treehouseintheglen.com), a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...


Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....


Blue Coat

BYOD (Bring Your Own Device)

Solution Brief: Top Five Considerations for a BYOD Policy...

Though BYOD offers a new way of working and a host of benefits, it also presents a swathe of new security issues. See the top five considerations for a...


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

Readiness Assessments: Vital to Secure Mobility

See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.


Symantec Corporation

Endpoint Security

Gartner Magic Quadrant for Endpoint Protection Platforms...

Read this report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.


SSH Communications Security

Enterprise Data Privacy

Preventing Data Loss Through Privileged Access Channels...

This white paper focuses on how organizations facing these issues of privileged access can effectively balance cost, risk and compliance.


Blue Coat

Threat and Vulnerability Management

Security Analytics Moves to Real-Time Protection

Discover the advantages of real-time threat scanning on an analytics platform.


Previous 1 3

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What you need to know about cryptocurrencies

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?