Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Building the Foundation for Cyber Resilience with Dell PowerProtect Data Domain Appliances
Sponsored by: Dell TechnologiesDiscover in this ESG Showcase how your organization can build the foundation for cyber resilience with Dell PowerProtect Data Domain Appliances.
-
MicroScope – April 2020: Seeking sustainability in the channel
Sponsored by: MicroScopeIn this issue, we look at sustainability in the channel, with customers increasingly wanting to know that their reseller has a handle on their carbon footprint. Also, read about SCC's insight on mobile working and workforce security, and take a closer look at Riverbed's return to its roots
-
Zero-click two-factor authentication
Sponsored by: SinchExplore how zero-click two-factor authentication can enhance security and user experience for financial services. Learn about innovative solutions like Data Verification and Flash Call Verification that streamline authentication without compromising protection. Read the full guide to discover how these methods can transform your processes.
-
CorCystems Provides Best-in-Class Managed IT Services Using Auvik Network Management
Sponsored by: Auvik Networks, Inc.In this case study, learn about how the IT teams at CorCystems Managed IT Services standardized the workflows of the approximately 700 escalation tickets that they encounter each month.
-
The Big Book of Machine Learning Use Cases – 2nd Edition
Sponsored by: DataBricksThis E-book contains a collection of technical blogs, including code samples and notebooks, designed to equip you with practical machine learning use cases you can put to work right now. Read on to gain insights from industry thought leaders and learn how you can leverage machine learning to bring your business into the future.
-
CW APAC buyer's guide to cloud security
Sponsored by: TechTarget ComputerWeekly.comIn this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.
-
CW APAC - June 2021: Career guide to cloud computing
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at the skills required for cloud professionals to succeed in an evolving industry, the risk to jobs posed by automation and the disciplines being taught at Future Tech Academy
-
The Forrester Wave™: Endpoint Security, Q4 2023
Sponsored by: BitdefenderAs organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.
-
Reducing Risk And Improving Security Of Cloud Deployments: Why Choose Vendor-Supported Linux Over Self-Supported Linux
Sponsored by: Red HatDiscover in this IDC white paper how Red Hat Enterprise Linux can support your organization with a performance-rich, secure, and flexible foundational component for your infrastructure stacks no matter where they are deployed
-
Expert guide: Best enterprise content management software of 2022
Sponsored by: TechTarget ComputerWeekly.comEnterprise content management (ECM) software can be an expensive, heavily involved purchase, so it's important to understand options before arriving at a decision. In this expert guide, we listed 10 important ECM platforms to consider while making a buying decision.