Your Search returned 92 results from our White Paper Library

Sort By

Endpoint Security

Does Device Sprawl Threaten Your Data?: Reducing data loss...

According to McAfee’s 2009 Unsecured Economies report, companies lost $1 trillion worldwide because of data loss, both malicious and accidental.



Eight ‘Must Haves’ Firewall Rules

With the torrent of new threats resulting from Web 2.0, it’s likely that your existing firewall is leaving you exposed.


Intrusion Detection and Prevention

The Total Economic Impact™ Of McAfee’s Network Security...

In May 2009, McAfee, Inc., commissioned Forrester Research to examine the financial impact and potential return on investment (ROI) that an organization...


Network Security

Network security for Midsize Organsations

Your network is one of five vulnerabilities faced by midsize organizations.


Mobile Device Management

Penetration Testing for iPhone/iPad Applications

This paper explains how penetration testing for iPhobne and iPad applications can help secure your organization against the risks mobile devices can pose....


Anti-Virus Solutions

Endpoint Security: Anti-Virus Alone is Not Enough

This report provides insight into endpoint security and anti-virus deployment, and explores whether anti-virus solutions may mislead some organizations...



7 Requirements for Hybrid Web Delivery

When it comes to secure use of the web, the limitations of web security vendors have forced IT teams to make a hard choice between deployment platforms,...



Protect Your Virtual Servers

Despite the ease with which organizations can deploy virtual servers, providing them with adequate security isn’t so simple. Discover how to mitigate the...



Protect Your Most Critical Data with McAfee Database Security...

Get more strategic about database security. Discover how to optimize your security whilst reducing risk with this suite of solutions.



Data Loss by the Numbers

News stories about mass data loss becoming more and more common and the damage to companies can be massive. This research paper by McAfee provides statistics...

Previous 1 3 4 5 9 10

Recommended for You


Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond


Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you


What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?