Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Unified Threat Management

   

Your Search returned 86 results from our White Paper Library

Sort By
  • Close-button

    Unified Threat Management

EMC Corporation

Risk Management

The ESG Information Security Management Maturity Model

This white paper from ESG is a guide for how to proceed in an increasingly mature threat landscape. Discover the best practices to adhere to as you modernize...


Blue Coat

Internet Security

The Benefits of a Hybrid Security Architecture

This ESG white paper discusses the increasingly dangerous threat landscape and makes the business case for a hybrid security architecture in place of a...


McAfee

Security

Data Loss by the Numbers

News stories about mass data loss becoming more and more common and the damage to companies can be massive. This research paper by McAfee provides statistics...


McAfee

Threat and Vulnerability Management

Protecting Information From Insider Threats

Find out how to protect your company from insider threats. Read the full guide for the best practices to adhere to and ensure your information remains...


McAfee

Security

Data Loss by the Numbers

News stories about mass data loss becoming more and more common and the damage to companies can be massive. This research paper by McAfee provides statistics...


Akamai

Cloud Computing

Leveraging Cloud Security to Weather Threatening Storms...

This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving,...


Fortinet

Security

IT Security Rationalization: The Austerity Program For ITSM...

If raw spending cuts may seem to be the main option of governments’ austerity programs, why can’t IT security management (ITSM) do the same? See how to...


McAfee

Security

McAfee Security Management: Get proactive—coordinate operations...

Today’s enterprise requires a different approach to security management. It’s no longer simply enough to secure the data center or network perimeter or...


McAfee

Threat and Vulnerability Management

Assessing Vulnerabilities: Integrating Data And Processes...

New vulnerabilities are disclosed by vendors both small and large on an almost daily basis, and keeping up can be tough. This white paper outlines the...


McAfee

Security

Supercharge Your Security: Improve security levels and event...

This white paper from McAfee explains how to gain real-time network protection, enterprise-wide situational awareness, and a responsive, investigation...


Previous 1 3 4 5 8 9

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What you need to know about cryptocurrencies

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?