Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 38 results from our White Paper Library

Sort By
BlackBerry

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


BlackBerry

Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


BlackBerry

Mobile Applications

The CIO's Guide to Wireless in the Enterprise

Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.


IDG Connect

BYOD (Bring Your Own Device)

Tablets 2020

This report features expert and local insight, as well as new research, into the growth of tablet devices across the world. It features spotlights on Africa,...


Aruba Networks

WLAN

What To Expect from 802.11AC

The extensions of the physical-layer wireless techniques pioneered in 802.11n which make up the final 802.11ac Wi-Fi standard will have a major impact...


Aruba Networks

Wi-Fi

Get Your Wi-Fi Ready for Mobile Applications: Top 10 Considerations...

Preparing the Wi-Fi network for the growing number of mobile applications requires more than just a simple upgrade of the network. This white provides...


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

University Creates Flawless BYOD Experience for Staff and...

Brunel University needed to deliver wireless access to students in more than 70 buildings campus-wide.


Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....


Logitech

Wireless Technologies

Free Yourself from Your Desk with Logitech’s New Bluetooth...

This blog explains how Logitech’s new keyboard and mouse give you the freedom to work wherever, on any computing device.


Fortinet

Security

Defend Against the Undetected

Learn more about how you can defend against the threats you don’t see with the right solutions in place.


Previous 1 3 4

Recommended for You

silhouette

Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you

kathryn-cave

The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech

phil-muncaster

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?