IDGConnect is your information technology resource for the latest research and product information in the IT Industry. The library includes technical white papers, webcasts, podcasts, case studies and product information.
Spotlight Reports
Whitepaper
|
|
03.29.07
Resource Center
Effectively control Internet access. • IDC Ranked #1 Internet filtering appliance • Protect against spyware, IM, P2P and inappropriate content
If you want to improve IT service availability, reduce compliance costs, or accelerate your ITIL implementation, consider using change control technology.
Latest Reports
Meeting the PCI Standard
by Solidcore Modelling H.264/AVC sensivitity for error protection in wireless transmissions
by The Thales Group
WHITEPAPER
|
|
06.07.07
Identity theft and credit card fraud is a large and growing problem. The Federal Trade Commission estimates that almost 10 million consumers were affected ...
by Solidcore Modelling H.264/AVC sensivitity for error protection in wireless transmissions
WHITEPAPER
|
|
06.06.07
The transmission of multimedia data over bandwidth-limited and error-prone channels has imposed to reconsider Shannon's separation principle that recommended ...
by The Thales Group
Data Breaches: Turn Back The Tide
by Cyber-Ark Software Strategize and Align
by CIO Custom Publishing
WHITEPAPER
|
|
06.06.07
Organisations need to re-evaluate their approach to information security in the light of recent security breaches.
by Cyber-Ark Software Strategize and Align
WHITEPAPER
|
|
06.06.07
With that data in hand, it's time to compile it into a compelling security strategy to present to senior management. The process of developing a multiyear ...
by CIO Custom Publishing
Speak up on Security
by CSO: The Resource For Security Executives Insider Risk: The Growing Concern for CSOs
by CSO: The Resource For Security Executives
WHITEPAPER
|
|
06.06.07
As everyone knows, security attacks and threats of all types have risen dramatically over the last several years. Sophisticated fraud and hacking techniques, ...
by CSO: The Resource For Security Executives Insider Risk: The Growing Concern for CSOs
WHITEPAPER
|
|
06.06.07
What's truly alarming, though, is that many executives think they're fully protected from these breaches and the insider threat. In reality, they've yet ...
by CSO: The Resource For Security Executives
Assess and Analyze
by CSO: The Resource For Security Executives The Loyalty Connection
by CRMGuru.com
WHITEPAPER
|
|
06.06.07
For many companies, the toughest part of security is moving out of reactionary mode into a proactive analysis of security, says Quinnild, who specializes ...
by CSO: The Resource For Security Executives The Loyalty Connection
WHITEPAPER
|
|
06.06.07
Customer churn rates are higher than ever, and businesses haven't figured out how to stop the bleeding. New CRMGuru research points to the cause: Although ...
by CRMGuru.com
High-Performance JMS Messaging
by Crimson Technologies Controlling the security of all things mobile
by Credant Corp.
WHITEPAPER
|
|
06.06.07
Application integration is a mission critical requirement for delivering successful e-business solutions and for maximizing the potential of every new ...
by Crimson Technologies Controlling the security of all things mobile
WHITEPAPER
|
|
06.06.07
Supports industry standard algorithms, including FIPS 140-2
-Secures data no matter where it is stored, including externa media, paging files, password ...
by Credant Corp.
- Novell’s Integrated Stack for SUSE Linux Enterprise
- iPrism ePolicy Handbook
- IT Strategies for Achieving Better Business Results
- Comparing Email Management Systems that Protect Against Spam, Viruses, Malware and Phishing Attacks
- The Top 10 Blunders in Integration and Testing ... And How to Avoid Them