Your Search returned 47 results from our White Paper Library

Blackberry

Security

Decade of the RATs

This report provides a threat intelligence assessment of the strategic and tactical use of novel malware and attack techniques employed by several threat actors,...

Blackberry

Security

Seven Strategies to Securely Enable Remote Workers

This white paper discusses seven strategies businesses can employ to ensure their remote workers are secure.

Blackberry

Security

Mind the Gap in Enterprise File Sharing & Sync Systems – The Need for Security and Governance

This report examines how today’s demands for better collaboration, file-sharing, and synchronisation capabilities are affecting the European data security and governance...

Default image

Security

File Sharing Without Fear: 5 Key Requirements for Law Firms When Choosing a Content Collaboration Platform

In today’s mobile, collaborative legal environments, any workforce productivity orcybersecurity strategy is incomplete without a secure content collaboration platform...

Brand

Security

Leveraging Crisis Communication for Cyber Security Response - Lessons and Best Practices from CIO’s Experience

Read this white paper to learn why a key element of any response plan is having a reliable, multi-modal mass communication system that all the organization members...

Blackberry

Security

10 Reasons to Bring All Your Endpoints Under One Roof.

This white paper examines 10 reasons businesses should use Blackberry’s Unified Endpoint Management solution.

Blackberry logo

Business Management

Moving Beyond MobileIron - Build Your Business with BlackBerry

This white paper looks at BlackBerry’s UEM solution and how businesses can utilize it to ensure staff can be productive on any device.

Blackberry

Business Management

Securing the Enterprise of Things

In this Blackberry Whitepaper, we present the results and analysis of a survey of enterprise IT decision-makers to get a sense of the current drivers, challenges...

Blackberry

Business Management

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Industries everywhere are experiencing an uptake in the Bring Your Own Device (BYOD) trend, where employees use their own laptops, tablets and mobile devices for...

Blackberry

Business Management

File Sharing Without Fear: 5 Key Requirements for Law Firms When Choosing a Content Collaboration Platform

Law firms often find themselves the target of threat actors due to the highly sensitive nature of the documents and data they store. Traditionally, many legal firms...

Previous1245

Recommended for You

New report: Lockdown and the IT department

Kathryn Cave looks at the big trends in global tech

How CIOs manage cloud lock-in

Mark Chillingworth on IT leadership

How assistive technologies are transforming the lives of disabled people

Nic Fearn on the technology that aims to drive positive change in the world

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?