ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • Navigating the Cloud: A Comprehensive Guide to Cloud Migration

    Sponsored by: Advanced

    Whether you are a business owner or an IT professional, download this e-book for the knowledge and tools you need to make the transition to the cloud with confidence.

  • Data protection: Not just about personal data and compliance

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Why implementing multiple carriers doesn’t achieve true network diversity

    Sponsored by: Sinch

    Network diversity is crucial for business continuity, but using multiple carriers doesn't always achieve true diversity. Learn how a single carrier with robust network architecture can provide reliable, redundant communications to keep your business connected. Read the full white paper to discover Sinch's approach to network diversity.

  • 2024 Comcast Business Cybersecurity Threat Report

    Sponsored by: Comcast Business

    Combining publicly available data with the 29 billion cybersecurity events Comcast Business detected across their base of security customers in 2023, this report provides a wide-angle view of the global threat landscape. Read now to learn more.

  • Data Governance Is Valuable: Moving To An Offensive Strategy

    Sponsored by: Alation

    It’s a data-driven world. So, how can your organization succeed in it? Read this white paper to learn how, by leveraging an offensive data governance strategy, you can catalyze your business’s growth.

  • Managing the invisible risk of non-human identities

    Sponsored by: One Identity

    As non-human identities (NHIs) proliferate, securing them is critical to avoid breaches and compliance issues. This white paper outlines the risks of unsecured NHIs and best practices for managing them, including identity discovery, risk assessment, and privileged access controls. Learn how to gain visibility and control over your NHIs.

  • CrowdStrike outage explained: What happened and what can we learn?

    Sponsored by: TechTarget ComputerWeekly.com

    A botched content update released by CrowdStrike in July 2024 led to a massive IT outage affecting about 8.5 million Windows systems worldwide. In this e-guide, learn more about how the outage occurred, its impact on organisations around the globe, and what you can do to mitigate the risks of similar incidents in future.

  • Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.

  • Buyer's guide to backup and recovery software

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

  • Data discovery: how to pick the right software

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.