Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 41 results from our White Paper Library

Sort By
BlackBerry

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


BlackBerry

Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


BlackBerry

Mobile Applications

The CIO's Guide to Wireless in the Enterprise

Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.


IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...


Aruba Networks

WLAN

What To Expect from 802.11AC

The extensions of the physical-layer wireless techniques pioneered in 802.11n which make up the final 802.11ac Wi-Fi standard will have a major impact...


Aruba Networks

Wi-Fi

Get Your Wi-Fi Ready for Mobile Applications: Top 10 Considerations...

Preparing the Wi-Fi network for the growing number of mobile applications requires more than just a simple upgrade of the network. This white provides...


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

University Creates Flawless BYOD Experience for Staff and...

Brunel University needed to deliver wireless access to students in more than 70 buildings campus-wide.


Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....


Logitech

Wireless Technologies

Free Yourself from Your Desk with Logitech’s New Bluetooth...

This blog explains how Logitech’s new keyboard and mouse give you the freedom to work wherever, on any computing device.


Fortinet

Security

Defend Against the Undetected

Learn more about how you can defend against the threats you don’t see with the right solutions in place.


Previous 1 3 4 5

Recommended for You

kathryn-cave

Blockchain For Dummies: What you really need to know

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

silhouette

Four hot IT growth areas to guarantee a big salary bump

IDG Connect tackles the tech stories that matter to you

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?