Your Search returned 7081 results from our White Paper Library

Sort By
IBM

Data Privacy and Security

Forrester – Test Data Privacy is Critical to Meet Compliances...

Just because data is stored in a test or development environment does not release your firm from the responsibility to comply with privacy regulations....


Flexera Software

Virtualization

AdminStudio Benchmark: Accelerating App-V Package Creation...

This document benchmarks the performance of AdminStudio application virtualization, and reveals its performance in terms of speed and simplicity compared...


Informatica

Data Integration

The Right Way to Integrate Data for Application Integration...

David Linthicum explains the challenges of using the wrong data integration tool and failing to take the complexity of its data into account. Learn how...


Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Meru Networks

Virtualization

From Centralization to Virtualization

It is useful to review how Wi-Fi networks have evolved, and where Meru's recognized reputation for innovation and design leadership has taken this powerful...


Meru Networks

Virtualization

Top 10 Things Network Managers Need to Know About Wireless...

Find out why WLAN Virtualisation works equally well with data, voice and video…


Imperva

Enterprise Data Protection

Top-10 Guide for Protecting Sensitive Data from Malicious...

This guide will explore the top ten ways to protect sensitive data from the very people that need access to it. While this is a difficult problem to address,...


Progress

Mainframe Servers

TDWI Checklist Report: Mainframe Modernization

Mainframe modernization takes many forms. Finding a more streamlined method for using mainframe information on other platforms and extending the mainframe...


1 2 693 695 697 708 709

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?