Your Search returned 0 results from our Editorial content

Sort By

Your Search returned 92 results from our White Paper Library

Sort By

Intrusion Detection and Prevention

The Total Economic Impact™ Of McAfee’s Network Security...

In May 2009, McAfee, Inc., commissioned Forrester Research to examine the financial impact and potential return on investment (ROI) that an organization...


Network Security

Network security for Midsize Organsations

Your network is one of five vulnerabilities faced by midsize organizations.

Cisco Systems, Inc.

Internet Security

Cisco 2010 Small Business

From IP-based video surveillance to social media security, you’ll learn how the latest technology will keep you not only up and running but ahead of the...



Gartner: Understanding Vulnerability Management Life Cycle...

This Gartner research paper provides guidance on the elements of an effective vulnerability program. Learn how to make your IT environment more resilient...

IDG Connect

Internet Security

Africa 2013: Cyber-Crime, Hacking and Malware

As African economies improve thanks to the booming technology industry, IDG Connect investigates the impact of cyber threats in the four corners of the...



Security Management 2.0: Time to Replace Your SIEM?

Is it time? Are you waving the white flag? Has your first-gen SIEM failed to meet expectations despite your investment? If you are questioning whether...

Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....



Endpoint Security: It’s Not Just Black or White

Learn how a meshed defense of blacklisting and whitelisting can detect and block both malicious payloads and actions that compromise a system and its network...


Security Monitoring

Magic Quadrant for Security Information and Event Management...

This Magic Quadrant offers insights into all the vendors in the Security Information and Event Management [SIEM] market.


Endpoint Security

A Buyer's Guide to Endpoint Protection Platforms

This Gartner paper acts as buyer's guide to endpoint protection platforms, listing the most advanced features to help buyers differentiate solutions.

Previous 1 3 4 5 9 10

Recommended for You


Programming languages to avoid learning in 2018

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?