ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Upgrading to VMware vSphere 6.7

    Sponsored by: VMware

    In this 40-page eBook, find out everything you'll need to know when considering an upgrade to vSphere 6.7, including the three phases that comprise the upgrade process: pre-upgrade activities, mapping the upgrade, and upgrade completion.

  • Tomorrow's ERP Today

    Sponsored by: Oracle Corporation

    Having the right technology can determine if your competitors catch up or crawl behind. In this webcast, explore how a successful ERP software can help your business move forward in a dynamic market, and meet the challenges of changing regulations with new technological standards.

  • Software-Defined Infrastructure for Dummies

    Sponsored by: VMware

    In this "For Dummies" guide, learn about the basics of software-defined infrastructure including common reference architectures, ideal use cases, and more, and find out what a software-defined infrastructure might look like in your own enterprise.

  • Flexxible IT Take on Practical Considerations in Moving to Citrix Cloud

    Sponsored by: Citrix Ready

    In this webinar, you'll learn practical considerations for moving to a cloud-based digital workspace.

  • Multi-Factor Authentication: Best Practices for Securing the Modern Digital Enterprise

    Sponsored by: Ping Identity Corporation

    Comprised credentials continue to be a top risk for breach with enterprises. One way to combat this issue is with step-up MFA. Step-up multi-factor authentication (MFA) is a dynamic authentication model where the user is required to perform additional authentication operations. This white paper proposes best practices for deployment of step-up MFA.

  • Securing your Enterprise Credentials

    Sponsored by: Ping Identity Corporation

    Stealing credentials is the primary motive for those that intend on attacking your enterprise. And relying on usernames and passwords can make it easier for them. In this white paper, learn how to implement an MFA solution to strengthen your security, so you can confidently manage digital transformation across your enterprise.

  • You Can't Spell Enterprise Security without MFA

    Sponsored by: Ping Identity Corporation

    Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and controls with multi-factor authentication, allowing them to move away from a high-risk, password based security approach. Listen as Paul Madsen from the CTO office of Ping Identity explains the benefits of MFA.

  • It's Time to Stop Talking About Passwords

    Sponsored by: Ping Identity Corporation

    In this quick guide to password security, learn how you can mitigate the risk of cyberattacks, while also providing a frictionless user experience to your employees with multi-factor authentication (MFA).

  • Looking Before You Leap Into the Cloud

    Sponsored by: Cloudera

    Inside, learn how to avoid making common cloud implementation mistakes, and in turn avoid exposing your data and analytics operations to unnecessary risk. Plus, find out how to plan and construct a cloud environment catered to the expanding requirements of your analytics teams.

  • Data Breach: Security Investigation, Detection and Rapid Response

    Sponsored by: Splunk

    Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.