ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Kaspersky Cloud Workload Security One Pager

    Sponsored by: Kaspersky

    Kaspersky Cloud Workload Security offers layered protection for cloud-based environments, minimizing resource consumption and enabling continuous security compliance. Leverage machine learning, real-time threat intelligence, and automated security checks to secure cloud migration and DevOps. Read the full Product Overview.

  • Alleviating cloud migration difficulties with robust security

    Sponsored by: Kaspersky

    As organizations increasingly adopt hybrid and multi-cloud environments, they face security challenges around compliance, visibility, and threat detection. This white paper examines the cloud security landscape and provides recommendations for enterprises to fortify their hybrid-cloud security posture. Read the full white paper to learn more.

  • Global Market Insights – Hybrid-Cloud and Container Security

    Sponsored by: Kaspersky

    This infographic provides insights into the state of hybrid cloud and container security in 2024. Key takeaways include the growing use of public cloud, top security challenges, and priorities for cloud-native technologies. Review the full infographic to learn more about the latest trends in this space.

  • Kaspersky Cloud Workload Security Datasheet

    Sponsored by: Kaspersky

    Discover how Kaspersky Cloud Workload Security can help secure your hybrid cloud and container environments. Learn about its multi-layered protection, resource-saving features, and compliance support. Read the full product overview to see how it can benefit your organization.

  • PQC from Theory to Practice

    Sponsored by: Utimaco

    Emerging quantum threats to classic cryptography are introducing significant business risk and setting the stage for potentially dire consequences. This webcast examines the importance of post quantum cryptography in mitigating the quantum threat.

  • Enhancing Visibility of HSM Keys across the Digital Ecosystem

    Sponsored by: Utimaco

    Utimaco, a leading provider of Hardware Security Modules (HSMs), has partnered with Infosec Global in order to enhance the visibility of HSM keys across the digital ecosystem. This webinar provides insights into this strategic partnership and the value it offers for your business.

  • Discover General Purpose Hardware Security Modules as a Service

    Sponsored by: Utimaco

    This webinar examines general purpose hardware security modules as a service, and provides key insights for ensuring success when adopting a data protection as a service strategy.

  • Fortifying Against Quantum Threats - Proven Defense Mechanisms

    Sponsored by: Utimaco

    Quantum computers have the potential to significantly enhance efficiency and problem-solving capabilities; however, in the wrong hands, they also pose a substantial threat to the security of present-day cryptography. This webinar shines a light on the world of quantum threats and offers proven defense mechanisms.

  • 2025 Media Consumption and Vendor Engagement Study EMEA

    Sponsored by: TechTarget ComputerWeekly.com

    TechTarget and Enterprise Strategy Group are conducting research to better understand the current state of content and research preferences throughout the purchase journey in organizations. We highly value your input and appreciate your time - it helps us improve our coverage for you and your peers.

  • 2025 Media Consumption and Vendor Engagement Study APAC

    Sponsored by: TechTarget ComputerWeekly.com

    TechTarget and Enterprise Strategy Group are conducting research to better understand the current state of content and research preferences throughout the purchase journey in organizations. We highly value your input and appreciate your time - it helps us improve our coverage for you and your peers.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.