ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Mission-Critical Mobile Security: A Stronger, Sensible Approach

    Sponsored by: Unisys

    This white paper shares a unqiue, innovative approach to help organizations address today's mobile security vulnerabilities and the security risks associated with BYOD. Uncover highlights for a reliable mobile security strategy that follows the user and is not limited to one device.

  • Simplifying PCI DSS Compliance

    Sponsored by: Unisys

    Through their research, the security experts at ControlScan have found that organizations are more successful with PCI compliance when they address PCI scope reduction early in the IT management cycle. Access this white paper that provides ControlScan's assessment of one software-based security solution that can reduce PCI DSS scope.

  • Delivering Virtual Apps to Any Mobile Workspace

    Sponsored by: Citrix

    Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.

  • Advanced Cloud Management for Hybrid Cloud Environments

    Sponsored by: Red Hat

    Access this white paper to learn how to implement advanced cloud management that provides the control and automation IT staff need to manage apps in public, private, or hybrid clouds. Additionally, you'll get targeted advice for managing AWS cloud computing platforms.

  • Single Sign-On Access to Secure Virtual Apps and Data

    Sponsored by: Citrix

    Mobile task workers need access to their Windows apps and desktops anytime, anywhere. This video discusses one mobile workspace platform that makes virtual apps and desktops instantly available to workers through its secure and quick tap and go functionality. Watch now to learn about this platform and its excellent virtual desktop performance.

  • Information Security Consulting Services Report

    Sponsored by: IBM

    This Forrester report evaluates 13 most significant information security consulting service providers against a 31 point criteria. It details how well these consultancies fulfill the criteria and where they stand in relation to each other.

  • Top Considerations for Selecting a Virtualization Management Tool

    Sponsored by: VMware

    Virtualization has become a fundamental step in creating a more dynamic, responsive IT organization. This paper presents an evaluation criteria for virtualization operations management tools. Read on to discover "must have" capabilities that will provide greater efficiency and a foundation for future cloud management initiatives.

  • Scale-out Set to Eclipse Scale-up for Enterprise Storage

    Sponsored by: Curvature

    Scale-up storage has served us well for the last two decades. Now, scale-out is poised to take over. Despite the scale-up market's current strength, the move into hyperscale computing, and the thought of increasingly larger arrays is causing concern.

  • Freecooling, Evaporative and Adiabatic Cooling Technologies in Data Center

    Sponsored by: Emerson Network Power

    This feature white paper analyses a solution that allows data centers to maximize energy efficiency, as well as exploit the management of energy and water by collecting information from the unit's key parameters and operating modes and ultimately calculating and implementing the combination that optimizes costs.

  • BadUSB 2.0: Exploring USB man-in-the-middle attacks

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.