ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • World Economic Forum Global Risks Report 2018

    Sponsored by: ComputerWeekly.com

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

  • Aziz Bank of Afghanistan Reduces the Risk of Cyber Threats Using Seqrite Endpoint Security

    Sponsored by: Seqrite

    Many customers rely on the Azizi Bank's online portal for service requests, but low internet bandwidth was affecting the bank's operation and business behavior. Inside this case study, learn how this bank achieved security through endpoint and firewall protection to monitor and control web traffic.

  • Implications of the Data-Breach Notification Requirements in the GDPR

    Sponsored by: Fortinet, Inc.

    Globally, cyber-crime damages are expected to double by 2021, totaling $6 trillion, according to CSO. This resource offers insight into the data breach notification requirements of the GDPR and provides strategies for preparing your data for the regulation.

  • 2017 State of Global Customer Service Report

    Sponsored by: Microsoft

    In this global survey, explore how CX expectations vary by age group and region. Take note of several particular trends that are important across all demographics.

  • Best Practices for Web Application Hosting

    Sponsored by: Alibaba Cloud

    This white paper compares traditional and modern modes of web hosting using cloud services and describes how cloud computing has the edge. Gain a practical reference to real-time business use cases, their impact, and best practices to help IT system managers, solution architects, and technology heads, handle critical deployment scenarios.

  • Cloud: A security risk and opportunity

    Sponsored by: ComputerWeekly.com

    With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.

  • Prepare Today to Transform Your Business Processes with Artificial Intelligence

    Sponsored by: K2

    This white paper explores how AI could help optimize business process management and automation. Learn about the business process pain points AI has the potential to improve and find out how to deliver AI apps to mainstream business users.

  • A Journey with Alibaba Cloud Through AI for the Travel Market

    Sponsored by: Alibaba Cloud

    Click inside to learn Cozitrip, a new travel agency chose Alibaba Cloud to help them with architecting designing, migrating, and implementing their new highly available environment.

  • Key Data Protection Requirements of GDPR

    Sponsored by: Fortinet, Inc.

    According to the Center for Internet Security (CIS), most successful attacks exploit poor cyber hygiene. To prevent attacks and adhere to the GDPR, advanced threat protection and detection is critical. This GDPR checklist offers everything your company needs to comply with the regulation as well as strategies for improving your security posture.

  • Data Security Under GDPR: How to Prepare for the Inevitable

    Sponsored by: Fortinet, Inc.

    Access this white paper to gain guidance on how to comply with GDPR when developing data protection policies

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.