ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • EU data protection: Essential guide

    Sponsored by: TechTarget ComputerWeekly.com

    The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.

  • Detect, Investigate, and Respond: Reduce Financial Crime and Fraud in Financial Services

    Sponsored by: Splunk

    The Splunk Fraud and Crime Outcome Brief details how financial institutions can leverage Splunk's advanced data aggregation and machine learning capabilities to detect, investigate, and respond to financial fraud and crime.

  • State of Application Security 2024

    Sponsored by: Cloudflare

    Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.

  • Market Insights and Decision Guide

    Sponsored by: ARG, Inc.

    To understand the top obstacles to maximizing the value of your organization’s IT investments, review this 19-page report, which is informed by the survey results of 1,500 ARG clients.

  • Moving Your SAS 9 Estate to the Cloud: Five Questions to Guide Your Journey

    Sponsored by: SAS

    Today, the moment has come for tech leaders to reassess the current cloud landscape and incorporate emerging technologies into an evolved approach to cloud analytics.Download this white paper, which will serve you as a guide to the state of cloud analytics, equipping you with 5 key questions to guide your journey.

  • The Quick Guide To Rewriting ITAM In 2025

    Sponsored by: Flexera Software

    Explore the evolving landscape of IT asset management (ITAM) in 2025. Discover how to prioritize security, navigate increasing complexity, and break down silos. Gain insights to shape ITAM's future through effective communication, employee training, and FinOps collaboration. Read the full white paper to unlock your ITAM potential.

  • Intelligent Workflow Automation Ushers In a New Era

    Sponsored by: Zebra Technologies

    In the not-too-distant past, hospitals took a siloed approach to technology, focusing specifically on transforming individual tasks and workflows. Today, acute care facilities realize the need to take a more holistic approach to technology investments. Learn more healthcare trends with this research content.

  • CW APAC: Expert advice on data analytics

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on data analytics in the Asia-Pacific region, Computer Weekly looks at how to marry the art and science of analytics, environmental considerations, the risks of sovereign data strategies and what one telco has done to address scalability challenges.

  • The Ultimate Guide to Selling Managed Network Services

    Sponsored by: Auvik Networks, Inc.

    From selecting prospects to closing deals, discover guidance for selling managed network services in this 17-page e-book.

  • CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?

    Sponsored by: TechTarget ComputerWeekly.com

    Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.