Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 11 results from our White Paper Library

Sort By
VeriSign

Security

Five Steps To Prepare For A DDoS Attack

This article provides five key DDoS mitigation steps enterprises can take now to prepare for a future attack.


Citrix

Desktop Virtualization

Top 10 reasons to Strengthen Information Security with Desktop...

In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.


McAfee

Security

The Big Data Security Challenge: Make SIEM Work For You...

Big Data is not only a challenge for customer-facing organizations—but for security teams as well. See why and how to overcome it in this paper.


McAfee

Security

Optimize Log management: How To Collect and Store Logs Securely...

This paper looks at concerns attributed to log management and explains how to collect and store logs securely.


Websense

Security

Defending Against Today’s Targeted Phishing Attacks

“Is this email a phish or is it legitimate?” It’s a the question that is being asked more and more often. See how to work it out.


Proofpoint

Encryption

How Encrypting Content in Transit and at Rest Reduces Liabilities...

This white paper explains how to implement effective encryption to ensure your organization reduces costs and liability. Discover four top encryption points...


VeriSign

Security

DDoS Mitigation: Best Practices For A Rapidly Changing Threat...

This white paper presents best practices to assist organizations in combating the DDoS threat while minimizing impact on business operations.


EMC Corporation

Data Deduplication

The ROI of Backup Redesign Using Deduplication: An EMC Data...

This IDC White Paper takes a look at the specific business value associated with using Data Domain systems as part of rapidly evolving backup and data...


Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....


Rapid7

Security

The Unwitting Danger Within Understanding and Mitigating...

This eBook from Rapid7explores the different kinds of user-based risks in today's corporate environment.


Previous 1

Most Recent Comments

IDG Connections

  • conect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • conect
  • conect
  • conect
  • conect
  • conect
no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/16/netapp
  • /view_company_report/506/qualys
  • /view_company_report/1304/ringcentral-inc
  • /view_company_report/1242/teradata

Poll

Is tech more of a problem or solution to climate change?