ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • IT Service Management Blueprint: Get Control of Your Service Desk

    Sponsored by: ServiceNow

    You need to modernize your service desk to handle a modern workload. In the journey to IT modernization, step one is consolidation. This e-book guides you in planning your service desk consolidation strategy, with best practices and how to choose the right tools for the job.

  • Now on Now: How Performance Analytics Gives Visibility and Control

    Sponsored by: ServiceNow

    Measuring and analyzing performance data is crucial to any business looking to make advances in their enterprise from the top-down. Discover how utilizing performance analytics delivered tangible results to ServiceNow's customer service department, development team, and more.

  • Continuous Delivery of Business Value with Micro Focus Fortify

    Sponsored by: Micro Focus

    Download this report to reveal how this software security system is changing the game for development and security teams at leading companies.

  • Managing the Risk of Post-Breach or "Resident" Attacks

    Sponsored by: Illusive Networks

    Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.

  • The State of Application Security in Today's Application Economy

    Sponsored by: Micro Focus

    As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. Download this resource to uncover survey findings and key takeaways.

  • A Guide to Protecting Microsoft Office 365 from Security Threats

    Sponsored by: Symantec

    Explore how Symantec is helping businesses achieve their O365 migration goals through a set of security and information compliance controls that protect Office 365.

  • Application Integrators vs. Deliberators

    Sponsored by: Capgemini

    When it comes to application integration, organizations can either fall into one of two categories: integrators or deliberators. Click inside to compare and contrast these two classifications – and see how much of a difference modernized app integration can truly have.

  • Tata Communications' IZO Internet WAN

    Sponsored by: TATA Communications

    The ability to accelerate apps on demand, optimize bandwidth use, and connect to the cloud is a key enabler for digital business. Learn about Tata Communications and the key features of their IZO Internet WAN, designed for the cloud, content delivery, and application-aware networking.

  • The Online Platform Helping to Keep the UK Safe

    Sponsored by: UKFast

    Learn how this online private network was able to use a new full disaster recovery site to ensure their system was available to support incident responses.

  • Meet Cloud Content Management

    Sponsored by: Box

    Download this white paper for a detailed overview of cloud content management with Box, including benefits, costs, security features and more.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.