ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • The Key Pillars For Protecting Sensitive Data In Any Organization

    Sponsored by: Thales

    Traditionally, companies have focused IT security primarily on perimeter defense. While this is important, it’s not enough. With today’s data scattered across networks, organizations need to apply a security strategy that protects data wherever it is. View this white paper to see the CipherTrust Data Security platform by Thales.

  • Security Starts Here AD: Account Lifecycle Management

    Sponsored by: Quest

    Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.

  • GoHenry Breakout Video

    Sponsored by: Rackspace

    In this short video, learn how Rackspace helped GoHenry migrate from private cloud to Google Cloud with ease.

  • IT leaders say SAP migration is critical to business success

    Sponsored by: Ensono Limited

    In this infographic, explore results from Ensono’s recent survey of IT leaders and their plans surrounding SAP cloud migration.

  • Stop, Collaborate, and Listen: Staying Agile in a Changing World

    Sponsored by: Atlassian

    In May 2020, Atlassian commissioned Forrester Consulting to survey 155 global decision makers about the role that high-bandwidth collaboration plays in aligning innovation across the organization. Explore their findings in this eBook.

  • Jade University Meets Highest Network Control Requirements Thanks to Infoblox

    Sponsored by: Infoblox

    Jade University needed to securely and reliably control its DNS and DHCP. In the university environment, demands on the network were increasing due to rising numbers of digital workplaces, devices and students accessing the campus network remotely. Read this case study to learn how they were able to up their network compatibility.

  • A Checklist for Developing a Future-Proof AP Organization

    Sponsored by: Kofax UK ltd

    A recent report from The Hackett Group outlined a set of 6 areas that top performing companies are prioritizing for the optimization of AP processes. Download your copy to learn more.

  • Is Threat Intelligence the Go-To Weapon for Fighting Advanced Threats?

    Sponsored by: Bitdefender

    The threat intelligence platform (TIP) market is emerging as the go-to weapon against the onslaught of today’s advanced cyberthreats – but what is it about TIPs that make them so effective against these threats? Read this article to find out.

  • CradlePoint Wireless Networks Study — Australia 2020

    Sponsored by: CradlePoint

    To explore the nexus of external disruptors, new communications technologies and digital transformation, CradlePoint commissioned leading technology analyst firm Telsyte to query IT decision makers in medium to large organizations that use a WAN to connect staff. Read the full report to learn the discoveries that were made.

  • Bring Digital to Life in Manufacturing

    Sponsored by: IFS

    Digital methods and processes are making huge changes to manufacturing, and organizations are reaping the benefits. Download this eBook to learn how you can get started digitizing your supply chain.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.