ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Digital Workplace - Navigating Success With Windows 11

    Sponsored by: SCC and Microsoft

    Though they offer great flexibility, hybrid work and the digital workplace present certain security and management challenges. Along with breaking down those issues,

  • Global Cyber Policy Radar: 2025 and Beyond

    Sponsored by: NCC Group

    A turbulent time in geopolitics is complicating the cybersecurity landscape and prompting reevaluation of current regulations. Join NCC Group’s experts, the professionals who play an instrumental role in the shaping of global cybersecurity laws, as they discuss what to look out for in 2025 and beyond.

  • How can you Support Vulnerable Customers?

    Sponsored by: FourNet

    As customer vulnerability evolves, organizations must adapt. Learn how AI, agent training, and empathetic policies can help you support vulnerable customers. Read the full case study to discover best practices for delivering exceptional service.

  • Superdry Well Architected Review

    Sponsored by: AWS & Daemon

    Daemon used a three-phase approach to conduct a successful AWS Well-Architected Review with Superdry, identifying remediation steps to improve reliability and security. Read the full case study to learn how Daemon helped Superdry modernize their cloud architecture.

  • CyberArk Labs Deconstructing Attacker Methods in Recent Breaches

    Sponsored by: CyberArk

    During this webcast, you’ll learn about three cautionary tales from the real world that detail how threat actors abused privileged access. Tune in now to familiarize yourself with the anatomy of a modern cyberattack and learn how you can keep your business safe.

  • Saving £1m on Cloud Compute via cost Optimisation

    Sponsored by: AWS & Daemon

    This customer saved £1M on cloud compute costs through strategic optimization. Learn how you can reduce cloud spend by retiring unused resources, right-sizing instances, and leveraging reserved and spot instances. Read the full case study to discover effective cloud cost optimization strategies.

  • SASE or SSE The Different Pathways to Zero Trust

    Sponsored by: Zscaler

    There are many challenges that come with implementing SASE, leading many to use multiple vendors or start with security service edge (SSE) to overcome organizational roadblocks. Read this Enterprise Strategy Group white paper to learn the challenges of reaching a fully-fledged SASE architecture.

  • Top 3 Factors when Choosing Cyber Protection

    Sponsored by: Kaspersky

    The advent of AI has lowered the barrier of entry for attackers, adding fuel to the fire that is the rapidly expanding threat landscape. Read on to uncover the critical information you need to strengthen your security posture and protect your organization. Access the full white paper now.

  • Legacy ERP: Holding you back from Generative AI?

    Sponsored by: Accenture

    Legacy ERP systems struggle to support modern business demands, especially integrating with Generative AI. This white paper examines why legacy ERP falls short and how Dynamics 365 offers scalability, interoperability, and AI-enhanced features to future-proof your business. Read the full white paper to learn more.

  • Scaling Your Business With An All-In-One HCM System

    Sponsored by: Dayforce

    Discover how a unified HCM system can help your organization scale by optimizing workforce productivity, delivering insights, and reducing compliance risk. Learn how to empower your people and unlock their full potential. Read the white paper to learn more.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.