Your Search returned 1758 results from our White Paper Library

Sort By
MuleSoft

Business Process Management (BPM)

Business Process Management: Best Practices for integrating...

In this paper, we will show how Business Process Management can be realized using a strategy called API-led connectivity. It will also cover recommended...


Accounting and Finance

Smart Solutions for the Paperless Office

Read this case study to learn how Epson Workforce Document Scanners helped streamline digital file collection and storage for Fireproof Records Center...


Malwarebytes

Security

Ransomware Piercing the Anti-Virus Bubble

This white paper outlines best practices for endpoint security in the light of recent ransomware attacks.


Neustar

Product Data Management

Five Ways Neustar Strengthens DNS Security

DNS might be your most vital, yet underrated component of your company's security posture. As the protocol responsible for everything from your website's...


Neustar

Disaster Recovery

The Case for Secondary DNS

Before October 21, 2016, the prevailing wisdom was that companies could rely on one DNS provider to keep their digital presence online. But on the 21st,...


Neustar

Business Management

Digital Media: Protecting Your OTT Content Distribution...

In this webinar, we review the best practices for digital rights compliance and how to protect your OTT content in a global and increasingly mobile consumer...


Neustar

Accounting and Finance

IPI Fraud Case Study

Watch this video to learn how Swiftcover, an online insurance company along with Neustar IP Intelligence was able to avoid


Neustar

Security

Podcast: Account Application Fraud Trends 2017

Listen to this podcast by Neustar to learn more about using trusted identities to fight fraud and to reduce customer friction.


Neustar

Security

Using Trusted Identities To Fight Fraud and Reduce Customer...

2016 was another year marred by breaches, hacks and data theft. With every successful cyberattack, the black market for personally identifiable information...


RiskIQ

Security

The State of Enterprise Digital Defence – Financial Services...

This report explores the extent of digital threats and the application and maturity of defence deployments across the financial services sector.


Previous 1 3 4 5 175 176

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What you need to know about cryptocurrencies

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?