Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Unified Threat Management

   

Your Search returned 73 results from our White Paper Library

Sort By
  • Close-button

    Unified Threat Management

EMC Corporation

Risk Management

The ESG Information Security Management Maturity Model

This white paper from ESG is a guide for how to proceed in an increasingly mature threat landscape. Discover the best practices to adhere to as you modernize...


Blue Coat

Internet Security

The Benefits of a Hybrid Security Architecture

This ESG white paper discusses the increasingly dangerous threat landscape and makes the business case for a hybrid security architecture in place of a...


McAfee

Security

Data Loss by the Numbers

News stories about mass data loss becoming more and more common and the damage to companies can be massive. This research paper by McAfee provides statistics...


McAfee

Threat and Vulnerability Management

Protecting Information From Insider Threats

Find out how to protect your company from insider threats. Read the full guide for the best practices to adhere to and ensure your information remains...


McAfee

Security

Data Loss by the Numbers

News stories about mass data loss becoming more and more common and the damage to companies can be massive. This research paper by McAfee provides statistics...


Akamai

Cloud Computing

Leveraging Cloud Security to Weather Threatening Storms...

This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving,...


Fortinet

Security

IT Security Rationalization: The Austerity Program For ITSM...

If raw spending cuts may seem to be the main option of governments’ austerity programs, why can’t IT security management (ITSM) do the same? See how to...


McAfee

Security

McAfee Security Management: Get proactive—coordinate operations...

Today’s enterprise requires a different approach to security management. It’s no longer simply enough to secure the data center or network perimeter or...


McAfee

Threat and Vulnerability Management

Assessing Vulnerabilities: Integrating Data And Processes...

New vulnerabilities are disclosed by vendors both small and large on an almost daily basis, and keeping up can be tough. This white paper outlines the...


McAfee

Security

Supercharge Your Security: Improve security levels and event...

This white paper from McAfee explains how to gain real-time network protection, enterprise-wide situational awareness, and a responsive, investigation...


Previous 1 3 4 5 6 7 8

Blogs

adrian-schofield

South African ICT

The thorny issue of internet freedom across Africa

Adrian Schofield sheds light on tech in South Africa

martin-veitch-thumbnail

My day in the Jeff Bezos and Amazon forest

Martin Veitch's inside track on today’s tech trends

phil-muncaster

China Rising

Why WannaCry might make Microsoft cry in China

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should we donate our health data the same way we donate organs?