ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Ovum Researchstart=30start=20start=10start=10start=10start=20"

  • CW APAC October 2023 – Buyer’s guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.

  • Winning the APJ Regulatory Compliance Battle By Securing Your Identities

    Sponsored by: CyberArk

    This whitepaper explores the diverse cybersecurity regulations in fourteen major APJ countries and how organizations can effectively comply with them using an integrated identity security strategy. Download the whitepaper to learn more.

  • The Pivot to Digital Transformation

    Sponsored by: Blue Yonder

    In this guide, explore how digitalization is driving the future of manufacturing, as well as the top strategies manufacturers are using right now to ensure supply chain visibility. Click here to learn more.

  • A Computer Weekly buyer's guide to next-generation programming tools

    Sponsored by: TechTarget ComputerWeekly.com

    All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.

  • Critical Scalability: Trend Micro Security Predictions for 2024

    Sponsored by: Trend Micro

    To review security predictions for 2024 – which concern generative AI, machine learning models and much more – tap into this 19-page research report by Trend Micro.

  • Top 10 ASEAN stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.

  • Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.

  • Defining the datacentre needs of 21st century enterprises

    Sponsored by: TechTarget ComputerWeekly.com

    This guide is designed to provide IT leaders with some insight into how their peers are addressing current problems through the use of cloud and colocation, and shine a light on how the analyst community sees the role of the datacentre changing over time.

  • Threat Intelligence Report 2024

    Sponsored by: NOKIA

    The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.

  • Computer Weekly - 29 November 2022: How to stop data retention from killing the planet

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.