Your Search returned 118 results from our White Paper Library

Default image

Business Intelligence

Abschottung ist gut – Kontrolle ist besser

Der Abschottungsansatz zum Schutz der Unternehmenssicherheit funktioniert heute einfach nicht mehr. Sobald ein Angreifer hinter die Netzwerkmauern gelangt, kann...

Default image

Networking & Communications

Adottare best practice relative ai server DNS per una protezione proattiva dal malware

Il panorama delle minacce informatiche è dinamico e si sta evolvendo rapidamente. Il DNS (Domain Name System) è una vulnerabilità nei sistemi di difesa di molte...

Default image

Virtualization

Comment la sécurisation du DNS récursif protège votre réseau de manière proactive

"Les menaces de sécurité sont constantes et chaque jour plus nombreuses. Si beaucoup d'entreprises ont adopté une stratégie de défense complète, comprenant protections...

Default image

Virtualization

La cybercriminalité en chiffres

La question n'est plus de savoir si votre entreprise sera victime d'une attaque ciblée impliquant un logiciel malveillant, un ransomware, un vol de données ou du...

Default image

Networking & Communications

In che modo la salvaguardia del DNS ricorsivo assicura protezione proattiva alla rete

Attacchi informatici di alto profilo sembrano verificarsi quasi ogni giorno negli ultimi anni. Chiaramente, le minacce alla sicurezza sono sempre in agguato e il...

Default image

Business Intelligence

Ist die DNS-Sicherheit Ihre Achillesferse?

Ständig tauchen neue Nachrichten zu Sicherheitsverstößen auf – das Thema Cybersicherheit lässt sich daher nur schwer ignorieren. Unternehmen wissen, dass sie umfassende...

Default image

Software

Implementación de un modelo de seguridad Zero Trust en el entorno hostil actual

Las empresas persiguen la transformación digital con el objetivo de aumentar el valor ofrecido al cliente, operar con mayor eficiencia y agilidad, y fomentar la...

Akamai client approved 150x150

Security

Making a DDoS Protection Plan: 8 Best Practices

This white paper explores best practices for building and maintaining a DDoS protection plan.

12891012Next

Recommended for You

New report: Lockdown and the IT department

Kathryn Cave looks at the big trends in global tech

How CIOs manage cloud lock-in

Mark Chillingworth on IT leadership

How assistive technologies are transforming the lives of disabled people

Nic Fearn on the technology that aims to drive positive change in the world

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?