ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Reinforcing Firewall Security: The Need to Adapt to Persistent Cyber Threats

    Sponsored by: Centripetal Networks

    Uncontrolled outbound communications, lateral threat movement, and limited bandwidth are just a few of the common NetSec challenges organizations face today. But with a reinforced firewall, businesses can address many of these issues. Learn more about how to reinforce your network security in this webinar.

  • Sustainable cyber security strategy

    Sponsored by: NCC Group

    As cybersecurity legislation and regulations continue to evolve, maintaining a sustainable cybersecurity program is critical. Read this white paper now to understand how meeting your organization’s compliance requirements not only boosts its overall cyber security posture but protects its very viability.

  • HP Workforce Experience Platform Demo

    Sponsored by: HP Inc

    An overwhelming volume of devices presents modern organizations with a serious challenge. How can you manage your devices, while ensuring their availability and performance for your employees? Watch this brief video for a full tour and demonstration of the HP Workforce Experience Platform.

  • CW EMEA October 2024: Legally bionic

    Sponsored by: TechTarget ComputerWeekly.com

    In Sweden, the legal profession has begun a discussion around the use of artificial intelligence in the sector, in response to the increasing use of AI tools at law firms.

  • Computer Weekly – 22 October 2024: Delivering Olympic IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we speak to a former Olympian and CIO of the Paris 2024 Olympic and Paralympic Games about continuous improvement. We also look at new enterprise AI services from major IT providers and assess the unified communications as a service market. Read the issue now.

  • Single-Vendor SASE For Dummies, 2nd Fortinet Special Edition

    Sponsored by: Fortinet, Inc.

    This Dummies guide introduces you to Single-Vendor SASE – the delivery of networking and security capabilities from one vendor in a unified solution. Learn how consolidation can help IT network and security teams drive operational efficiency, reduce costs, and more.

  • Revolutionizing Key SASE Use Cases with Unified, Simple, and Flexible Offerings and Live Demos

    Sponsored by: Fortinet, Inc.

    Learn more about groundbreaking SASE innovations, enhancing both security and simplicity. In this webcast, industry experts will present live demonstrations, providing you with a firsthand look at how these cutting-edge technologies work in real-world scenarios.

  • From Patchwork To Platform

    Sponsored by: Red Hat

    This e-book examines the differences between upstream Ansible and Red Hat Ansible Automation Platform, a hardened and supported enterprise solution. Learn how the platform can enhance security, scalability, and ROI for your organization's automation needs. Read the full e-book to discover the benefits of enterprise-grade automation.

  • Navigating Success: A Guide to PLM for Food and Beverage Manufacturers

    Sponsored by: Revalize

    This e-book explores how PLM software helps food and beverage manufacturers tackle challenges like labor shortages, supply chain issues, and rising costs. Learn how PLM boosts efficiency, accelerates innovation, and ensures data security and compliance. Read the full e-book to discover the benefits of adopting a PLM solution.

  • Data Storage Matters For High Performance and Cost Control

    Sponsored by: StorPool

    In this webcast, you’ll learn about the top performance degradation causes for block storage and how you can mitigate them with a fully managed storage solution. Watch now to discover the importance of effective data storage for high performance and cost control.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.