Your Search returned 9194 results from our White Paper Library

Check point0825 150x150

Business Management

The Top Four Cyber Security Threats To Android Mobile Devices

A recent study found that one in 1000 devices were infected with mobile surveillance and mobile Remote Access Trojans (mRATs). These attacks were found both on Android...

Riverbed logo pms1655710 150x150

Business Management

10 Reasons Why Developers Need Application Performance Management

Review 10 ways how developers can use APM to create better applications with end-user experience monitoring to identify problems and performance bottlenecks before...

Opentext logo 20171933 150x150

Business Management

Digital Governance: Finding the Balance Between Opportunity and Risk

Disruptive technologies will contribute to the creation, distribution, and fragmentation of enterprise information. The additional volumes of new data types will...

Projectplace logo2216 150x150

Business Management

Collaborative Planning

Why do projects become a success? More and more people believe this is because of motivation and commitment, not planning and control. Collaborative planning, a...

Zycko red logo only1644 150x150

Business Management

Why DDoS Makes for Risky Business - And What Can You Do About It

In the last 10 years, the number of DDoS attacks has increased significantly. However, despite their prevalence, many organisations still don’t have a dedicated...

Bmc logo rgb2240 150x150

Business Management

Workload Automation: Accelerate Digital Services Delivery

Managing Hadoop batch processing may consume a significant portion of application developers’ time and effort, which drives up application development times and...

Dyn logo 150x150

Business Management

Making the Move to a Cloud-Based DNS Service

Move away from uncertain performance and move to the cloud.Your visitors’ first interactions with your website start with a series of DNS queries. If your DNS performs...

Bluecoat symantec logo3739 150x150

Business Management

Keeping Your Private Data Secure

Across businesses of all sizes, vigilance is key when it comes to protecting your private data. Security breaches are on the rise and if your organization suffers...

Logrhythm logo0126 150x150

Business Management

Surfacing Critical Cyber Threats Through Security Intelligence

In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™...

Vormetric logo1422 150x150

Business Management

Cracking the Confusion: Encryption and Tokenization for Data Centers, Servers, and Applications

Should you encrypt everything? There has never been more options for encrypting data across applications, databases, servers, storage, and the entire datacenter...

12897899901919920

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?