ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • CW APAC: Trend watch: Enterprise resource planning

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

  • Fortify Your Enterprise With Modern Security

    Sponsored by: FCN

    Review this white paper to discover the 3 pillars of Dell’s holistic approach to modern security.

  • Building a Modern Educational IT Network

    Sponsored by: Auvik Networks, Inc.

    In this 16-page e-book, unlock recommendations for IT management in educational institutions.

  • In 2017, the insider threat epidemic begins

    Sponsored by: TechTarget ComputerWeekly.com

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

  • Proactive Security: Software vulnerability management and beyond

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • How to Choose a Background Check Provider for Hiring at Scale

    Sponsored by: Checkr

    In a tight labor market, choosing the wrong background screening provider could be a costly mistake. This guide shares five ways the best background check partner can help you get ahead in your hiring market—plus the questions you need to ask and must-have solutions when choosing a provider.

  • Gain a Competitive Edge with Evergreen//One

    Sponsored by: Pure Storage

    Unlock the power of cloud economics with Evergreen//One, an enterprise-grade Storage-as-a-Service solution. Gain a competitive edge with high performance, uptime, and energy efficiency. Read the product overview to learn how Evergreen//One could transform your sustainable data storage strategy.

  • Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce

    Sponsored by: Zscaler

    This in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.