Your Search returned 9194 results from our White Paper Library

Ibm logo new0740 150x150

Business Management

Enterprise Intelligence: How to Effectively Understand Multi-Dimensional Data About Threats

Today, organizations need to identify and protect themselves and constituents from a variety of threats. Relevant data streams pour in from internal and external...

Ca r 1c black 2014 015959 150x150

Business Management

Advanced Session Security Countering the Risk of Session Hijacking

Business users and consumers expect to have easy, instant access to their applications and data anytime, from anywhere and on any device, generating multiple sets...

Ca r 1c black 2014 015959 150x150

Business Management

How Can I Both Enable and Protect My Organization in the New Application Economy?

Read this paper to discover how to both enable and protect your organization in the new application economy.

Ca r 1c black 2014 015959 150x150

Business Management

How Can I Both Enable and Protect My Organization in the New Application Economy?

Cloud and mobile have created a plethora of new challenges for IT organizations, and have significantly shifted the role of security. Are you ready for the shift?...

Ensilo2807 150x150

Business Management

Keeping Financial Institutions Operating

Every second counts when dealing with money as any delays to trades, transfers or loan closures could result in serious consequences for both customers and businesses....

Hpi3737 150x150

Business Management

Mobile Application Security Report 2016

HPE’s first mobile application security study was published in the fall of 2013. At that time HP analyzed 2,000 applications and found that 97 percent of them accessed...

Pan logo badge black kick up0906 150x150

Business Management

Architecture Matters Beyond Layered Security Approaches

This white paper looks at how the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business and protecting it against...

Pan logo badge black kick up0906 150x150

Business Management

Top 10 Zero-Day Exploits of 2015

This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime...

Pan logo badge black kick up0906 150x150

Business Management

First Principles for Network Defenders: A Unified Theory for Security Practioners

In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.

12786788790919920

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?