ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • API Access Management

    Sponsored by: Okta

    Through a combination of existing policies like Multi-Factor Authentication and Universal Directory, and the integration of the OAuth protocol, discover the key capabilities and potential benefits of Okta’s API Access Management system – read on to learn more.

  • Secure Your Cloud Infrastructure with Okta

    Sponsored by: Okta

    In this Okta webinar, discover how automating IAM controls can enable a more streamlined DevOps program, explore the benefits of the Cloud Operating Model, and more – watch now to unlock the full educational lunch and learn.

  • JetBlue Case Study

    Sponsored by: Okta

    Given that they have around 40 million customers annually, it’s not easy for JetBlue to ensure each user experience is personalized, secure and streamlined. As part of a larger initiative to improve identity management and security, JetBlue deicided to partner up with Okta. Read on to unlock the full story.

  • Cisco Cloud Mailbox Defense

    Sponsored by: Cisco Umbrella

    Your Office 365 migration is paying off, but you have new questions and challenges about how best to secure your new cloud environment. Are you adequately protected from threats without controlling your internal mail? Leverage this data sheet to learn how Cisco’s Cloud Mailbox Defense strives to keep your cloud mailboxes safe.

  • How to Get and Maintain Control of your Microservices

    Sponsored by: Citrix

    In this e-book, learn about a hybrid app delivery system that’s designed to provide DevOps teams with the agility they demand while giving networking teams the control and centralized management they need.

  • 2021 Contact Center Buyer's Guide

    Sponsored by: Genesys

    Access this buyer's guide to explore how these trends are defining the essential capabilities that drive a modern contact center in 2021 and beyond, including digital engagement, remote work and operations, collaboration tools, and more.

  • Forrester CMD Webinar - Challenges in the Security Landscape

    Sponsored by: Cisco Umbrella

    Access this Forrester webinar to learn some of the biggest challenges faced by security pros at organizations of all sizes and what they’re doing to overcome security risk. And discover Cisco Cloud Mailbox Defense, a new email security product engineered with the aim to help security pros address email threats and overcome these challenges.

  • Avoiding Business Email Compromise

    Sponsored by: Trustwave

    Email inboxes remain a lucrative target for cyberattacks – and given the recent success of phishing and business email compromise (BEC), this trend is likely to continue. Read this case study to learn how a multinational manufacturer with a distributed workforce was able to protect email inboxes and avoid BEC fraud.

  • Application Delivery Solutions

    Sponsored by: Citrix

    Your ADC plays a pivotal role in unlocking the true potential of microservices and containers like Kubernetes. In this white paper, learn about Citrix app delivery solutions and find out how to get your microservices-based apps to production faster.

  • Beaumont, Texas Schools Embrace Hybrid Learning with AI-Driven Juniper Network

    Sponsored by: Ampito

    In this case study, find out how Beaumont Independent School District is navigating the new hybrid learning paradigm with Juniper’s AI-driven wireless networking. Find out how they’ve simplified network management with AI-driven operations, prevented cyberattacks, and more.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.