IDGConnect is your information technology resource for the latest research and product information in the IT Industry. The library includes technical white papers, webcasts, podcasts, case studies and product information.
Spotlight Reports
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/imgserver/companies/400/420/66x.jpg)
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/img/leaddb/0.gif)
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/imgserver/companies/600/645/66x.jpg)
Conquering the Billion Dollar Problem:Automate Your Business Process Exceptions to Save Time & Money
Webcast
|
|
12.19.07
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/img/leaddb/0.gif)
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/imgserver/companies/0/38/66x.jpg)
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/img/leaddb/0.gif)
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/imgserver/companies/600/626/66x.jpg)
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/img/leaddb/0.gif)
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/imgserver/companies/0/72/66x.jpg)
Whitepaper
|
|
11.12.07
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/img/leaddb/0.gif)
Resource Center
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/imgserver/companies/0/98/66x.jpg)
Effectively control Internet access. • IDC Ranked #1 Internet filtering appliance • Protect against spyware, IM, P2P and inappropriate content
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/img/leaddb/0.gif)
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/imgserver/companies/100/152/66x.jpg)
If you want to improve IT service availability, reduce compliance costs, or accelerate your ITIL implementation, consider using change control technology.
![](https://web.archive.org/web/20080112022221im_/http://www.idgconnect.com/img/leaddb/0.gif)
Latest Reports
Continuous File Integrity Monitoring: A New Approach for PCI Compliance
by Solidcore Leveraging EMC Captiva eInput to Capture Information from Remote Locations
by EMC Corporation
WHITEPAPER
|
|
01.10.08
According to recent, independent research -- PCI requirements 10 and 11 are among the least satisfied requirements across Level 1 merchants, with almost ...
by Solidcore Leveraging EMC Captiva eInput to Capture Information from Remote Locations
WEBCAST
|
|
01.09.08
By accelerating the capture of information, organizations can reduce the delays associated with moving paper from one office to another--especially from ...
by EMC Corporation
Bridging the Great Divide: The Convergence of Physical and Logical Security
by Imprivata Leveraging SOA For Strategic Value Creation -- Florida Community College Jacksonville
by Software AG
WHITEPAPER
|
|
01.08.08
By integrating your physical and logical systems, you can increase the value of your building access badge, realize tighter enterprise security, and address ...
by Imprivata Leveraging SOA For Strategic Value Creation -- Florida Community College Jacksonville
CASE-STUDY
|
|
01.08.08
Florida Community College Jacksonville (FCCJ) is instituting Service-Oriented Architecture (SOA) in a three-phase initiative that currently automates ...
by Software AG
Are You Ready to Embrace SOA? Let's Talk!
by Software AG SOA: Building the Roadmap
by Software AG
WHITEPAPER
|
|
01.08.08
Businesses today need information systems that can keep pace with rapidly changing market demands, higher customer expectations and their strategic business ...
by Software AG SOA: Building the Roadmap
WHITEPAPER
|
|
01.08.08
Just as Rome wasn’t built in a day, implementing SOA should be an incremental, iterative process that should start modestly. Choose a handful of ...
by Software AG
Anonymizers – The Latest Threat to Your Web Security
by St. Bernard Software Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
by St. Bernard Software
WHITEPAPER
|
|
01.08.08
A new white paper from St. Bernard, Anonymizers – The Latest Threat to Your Web Security explores the growing dangers of anonymizers, an unfortunately ...
by St. Bernard Software Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
WHITEPAPER
|
|
01.08.08
This new white paper, Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge, argues that assuring secure content ...
by St. Bernard Software
Get Better Results From Your IT Investments
by Fluke Networks The Value of Enterprise SSO to HIPAA Compliance
by Imprivata
WEBCAST
|
|
01.07.08
In today’s environment, you need to get the most out of your assets and people… all the while serving the strategic needs of your business ...
by Fluke Networks The Value of Enterprise SSO to HIPAA Compliance
WHITEPAPER
|
|
01.07.08
The HIPAA Act established formal regulations designed to protect the confidentiality and security of patient information. HIPAA security regulations require ...
by Imprivata