Your Search returned 106 results from our White Paper Library

Sort By
IDG Connect

Storage Hardware

Lead Generation Case Study

This case study outlines how IDG Connect helped a global IT giant improve the sales of their PCs and Laptops.


Dell EMC & Intel®

Workforce Planning and Management

Faculte a sus empleados mediante el estimulo a la habilitacion...

Los millennials estan cambiando la cara del mundo del trabajo a traves de su conocimiento de las nuevas tecnologias, y la TI tiene problemas para seguirles...


Dell EMC & Intel®

Workforce Planning and Management

Redefinición de la habilitación de la fuerza de trabajo...

Intel y el logotipo de Intel son marcas comerciales de la Corporación Intel o sus filiales en los Estados Unidos o en otros países   Intel Inside®,...


Nokia

Cloud Computing

Public-Private Hybrid Cloud for Large Enterprises

This white paper explores how Nokia can provide your organisation with a secure hybrid-cloud approach that reduces your total cost of ownership.


Nokia

Cloud Computing

Security Cloud for Large Enterprises

This white paper discusses Nokia can provide your organisation with end-to-end security and an enterprise private cloud that can reduce your total cost...


Thales eSecurity, Inc.

Encryption

2017 Global Encryption Trends Study

This Ponemon paper looks at how the use of encryption has evolved over the past 12 years and the impact of this technology on the security posture of organizations....


CA Technologies

Business Process Automation

Cross-Enterprise Workload Automation Helps Reduce Cost and...

This brief intrudes CA’s Workload Automation solutions, highlighting features, benefits, and potential ROI.


Thales eSecurity, Inc.

Encryption

Addressing Key Provisions of the General Data Protection...

This paper highlights Data encryption and key management strategies to ensure GDPR compliance.


Zebra

Business Process Automation

Reinventing Retail: 2017 Retail Vision Study

This report outlines the results from a study into the focus, concerns and investment plans of retailers.


F5 Networks

Security

Ten Steps for Combating DDoS in Real Time

This paper outlines 10 recommended practices and tools for repelling distributed denial-of-service attacks and mitigating them when they happen.


Previous 1 3 4 5 10 11

Recommended for You

dan2

US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future

kathryn-cave

A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?