ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • A Computer Weekly buyer's guide to Asset Management for Hybrid IT

    Sponsored by: ComputerWeekly.com

    Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.

  • Automating Malware Investigation at One of the World's Leading Investment Firms

    Sponsored by: Splunk Services UK Ltd

    Blackstone's Incident Response team used to investigate each malware alert as if a compromise has already occurred. Considering the volume of alerts and the potential for inconsistency in any manual process, Blackstone knew there had to be a better way. In this case study, learn about the benefits that Blackstone saw since deploying Splunk Phantom.

  • The Essential Guide To Fraud

    Sponsored by: Splunk

    Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.

  • Improving the Customer Experience Through Assistive Selling

    Sponsored by: Samsung Electronics

    In this article, explore how the smart application of retail technology is helping physical retailers transform their storefront, and uncover how the application of assistive selling tools are improving CX and driving revenue in the physical retail environments.

  • The SIEM Buyer's Guide

    Sponsored by: Splunk Services UK Ltd

    Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.

  • Zeppelin Takes Predictive Maintenance to New Heights

    Sponsored by: Splunk Services UK Ltd

    With the recent addition of remote IoT tools to industrial machinery, Zeppelin was finding their IT environment spiraling into a level of complexity they simply couldn't keep up with. Check out this case study to find out how Zeppelin used Splunk Enterprise to tether multiple IT systems, data sources, and aggregated IoT devices under one roof.

  • Viasat Transforms IT Operations Through Splunk Machine Learning, Predictive Analytics

    Sponsored by: Splunk Services UK Ltd

    Download this case study to learn how Viasat integrated Splunk's predictive analytics and machine learning capabilities into their existing Splunk Enterprise ecosystem, leaving a lasting impact on their business through features like proactive IT monitoring, enhanced business analytics capabilities, and more.

  • Identity and Data Management

    Sponsored by: Optiv

    Breaches, compliance and digital transformation are 3 challenges organizations today are faced with. Another issue at the center of today's challenges is compromised identities. In this resource, learn why your organization needs a strategic approach to identity and data management. Also learn how Optiv can help your organization do this.

  • How Mobile Is Transforming Retail Staffing and the Shopping Experience

    Sponsored by: Samsung Electronics

    Download this resource to learn more about how mobile can transform retail staffing and the shopping experience, and take your organization to the next level.

  • Maximizing Port Safety

    Sponsored by: Motorola, Inc.

    Business-critical communication systems are enabling ports to overcome the challenges and generate competitive edge through more efficient operations, safer working conditions and stronger security protection. In this resource, learn how Motorola Solutions can help your organization deliver secure port operations, as well as minimize risk.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.