- Access Rights
- Access Control Software
- Endpoint Security
- Intrusion Prevention
- Intrusion Prevention Systems
- Physical Security
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Access Rights | Access Control Software | Authentication | Endpoint Security | Intrusion Prevention | Intrusion Prevention Systems | Physical Security | RACF | Remote Access Security | Security Policies | Security Threats | Security Tokens | VLAN | Web Identities
ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Aiming for organizational agility? Prepare to change how you scope work, structure teams, develop talent, practice leadership, and deliver and sell your products.
Our 2015 IT salaries survey reveals the average pay for IT pros in the U.S., broken down by role and region of the country, job aspirations, optimism levels, and key tech projects.
As senior IT leaders sought to adapt IT strategies to a rapidly changing, digitally connected marketplace, one thing that didn't change in 2015 was their pay.
Dell issued a fix for a root certificate similar to Superfish that could potentially allow attackers to intercept encrypted private data on its PCs.
Expert Dan Sullivan outlines criteria for evaluating big data security analytics platforms for collecting, analyzing and managing large volumes of data generated for information security purposes.
The best approach for penetration testing is to use a combination of tools with different approaches. Here are several pen testing tools for midmarket companies.
Cisco has launched an open source project, called Contiv, to build technology that automates the use of security, storage and networking in cloud-based containerized applications.
This week bloggers explore how the Ericsson Cisco venture may affect SDN and NFV, data center automation and Extreme Networks' Wave 2 APs.
Facebook says it's working on a 100 GbE Wedge switch; Extreme Networks launches 802.11ac Wave 2 APs; and the Linux Foundation envelopes the Open Network Summit.
Now more than ever, data centers need creative employees to adapt and outwit problems for a more efficient, reliable IT infrastructure.
I have 80 Windows servers in the data center. What can I use for daily event log monitoring?
Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security.
A pivotal magazine article helped point medical doctor Parsa Mirhaji along a path to a semantic data lake for healthcare analytics applications, using Hadoop, RDF, graph databases and more.
Big data may be all the rage, but data warehouse platforms are still being utilized by companies of all sizes. Expert Craig S. Mullins takes a look at the technology.
IBM's planned purchase of The Weather Co.'s data operations may be a bellwether event from which data professionals can learn.