ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • A Buyer’s Guide to Enterprise Agile Planning Solutions

    Sponsored by: Digital.ai

    In this exclusive e-book, find out how Digital.ai Agility can help your organization unlock new customer products and services, optimized customer experiences, better business process insights and accelerated time to market.

  • IT Project: Migration to cloud

    Sponsored by: TechTarget ComputerWeekly.com

    The benefits of using cloud are well-known, but the challenges and barriers enterprises come up against during their move off-premise can be wide, varied and unexpected. Knowing how best to negotiate these issues can help speed up the process of shifting workloads and applications to the cloud immeasurably.

  • Cybersecurity resilience in an era of identity sprawl

    Sponsored by: One Identity

    As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.

  • Essential guide to dealing with a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences

  • Inside MLC Life Insurance's cloud journey

    Sponsored by: TechTarget ComputerWeekly.com

    When MLC decided to move all its infrastructure, applications and services to the public cloud, its journey was more about people than technology. Learn how MLC overcame these people-related challenges in its move to cloud, improved its security posture and reduced infrastructure spending.

  • Next generation network security

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

  • Focus: Securing the cloud

    Sponsored by: TechTarget ComputerWeekly.com

    While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.

  • Cloud PAM Buyer’s Guide A No-Fuss, Non-Salesly Tour Of What Matters Most

    Sponsored by: Saviynt

    Well-run PAM programs add enterprise-wide visibility and leverage identity intelligence and analytics to help leaders make better access decisions. You’re likely hunting for the right list of questions to ask and concerns to raise en route to this more secure reality. Read this guide to learn more.

  • CW APAC, August 2021: Trend Watch on Datacentre Operations

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on datacentre operations in the Asia-Pacific region, Computer Weekly looks at the most innovative methods being adopted to improve datacentre efficiency.

  • Overcoming Data Challenges for Innovation in Financial Services through 360-degree Business Solutions from InterSystems

    Sponsored by: InterSystems

    Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.