- Access Rights
- Access Control Software
- Endpoint Security
- Intrusion Prevention
- Intrusion Prevention Systems
- Physical Security
Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Access Rights | Access Control Software | Authentication | Endpoint Security | Intrusion Prevention | Intrusion Prevention Systems | Physical Security | RACF | Remote Access Security | Security Policies | Security Threats | Security Tokens | VLAN | Web Identities
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Grace Simrall's smart city vision includes more than an open data portal; she wants data to be useful and user-friendly.
A business process management suite can deliver speed, flexibility and cost savings to a software development environment. For the greatest return, make the BPMS the focal point.
NJOHSP's Steven Gutkin explains how building strategic public and private partnerships can help protect a country's critical infrastructure and offers pointers on nurturing such alliances.
A boot mode vulnerability allowed attackers to eavesdrop on calls made on certain Android devices. Expert Judith Myerson explains how the complex exploit works.
Google and Mozilla weigh the proper response to Symantec certificate authority issues, as the CA giant prepares an alternative proposal for reinstating trust.
A new security tool will let users scan their systems for the presence of NSA spyware found in the latest Equation Group leak, and tens of thousands are already infected.
One challenge in managing wireless networks is that the tools and tech are changing rapidly. Here’s what network pros need to know now.
To manage wireless networks, IT pros must keep pace with an array of rapidly changing products. Are you up to date on what tools and tech are now on the market?
Extreme Networks provides a variety of campus LAN switches, including those with just a few fixed ports and modular switches that can accommodate gigabit and multi-gigabit ports.
DCIM tools now play a critical role in keeping data center operations running reliably and efficiently, so buyers should pay close attention to their deployment.
Policies allow IT teams to manage VM availability, security and other components more efficiently. Use these tips to establish and implement them in your data center.
More data center teams have moved to software-defined networks. And while the technology brings new benefits around automation, it also brings a host of implementation challenges.
Corporate users are becoming more open to deploying big data systems with Apache Spark in the cloud, Databricks CEO Ali Ghodsi says in a Q&A on the open source processing platform.
Slowdowns in database processing can put a big crimp in business applications -- a corporate malady that database performance management tools are designed to help remedy.
Software containers encapsulate complexity and ease deployment, two traits that are helping to elicit growing interest in using them as part of big data systems.