Your Search returned 24 results from our White Paper Library

Capture 1

Security

A Look Inside Financially Motivated Attacks and the Active FIN8 Threat Group

Gigamon Applied Threat Research (ATR) released new research that includes details on a previously unpublished reverse shell used by FIN8. Get the cyber threat report....

Capture 1

Networking & Communications

EMA: Understanding the Value of Application Aware Network Operations

Download the EMA report, “Understanding the Value of Application-Aware Network Operations” to learn about the true application visibility needed for today’s operations....

Capture 1

Security

Security at the Speed of Your Network

Need to choose between security and performance? Read “Security at the Speed of Your Network” to find out how you can have both.

Capture 1

Networking & Communications

Definitive Guide™ to Next-Generation Network Packet Brokers

See and understand your network: Reduce risk, complexity and costs. How? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to find out!...

Capture 1

Security

What Do You Mean TLS 1.3 Might Degrade My Security?

Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn...

Capture 1

Security

ESG Brief: The Importance of a Common Distributed Data Services Layer

It’s all about seeing clearly: Read the ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff...

Gigamon

Networking & Communications

The Surprising Ways that Inline Bypass Helps Protect Network Operations

This white paper looks at how businesses can use inline bypass to increase network resiliency while reducing security issues.

Gigamon

Security

Inline Bypass – Scaling Inline Threat Prevention Tools to Keep Pace with High-Speed Networks

This white paper explores the benefits that the GigaSECURE Security Delivery Platform can provide businesses.

Gigamon

Security

Security at the Speed of Your Network

This white paper examines the security issues stemming from the continuous growth of network data.

Previous13

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?