ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • End-to-end Networking Visibility and Management

    Sponsored by: Panduit

    To better understand how leading organizations are addressing end-to-end network visibility and management as well as adopting new technologies to drive greater operational efficiencies, download this exclusive ESG e-book.

  • The Real-World Impact of Cellular Connectivity on Public Safety

    Sponsored by: Cradlepoint

    First responders act in situations in which a few seconds can mean the difference between life and death. Because of this, when they rely on a network to facilitate their communication, it is essential that the network be as strong and ready as they are. Read on to learn more about why first responders choose CradlePoint for their network needs.

  • Computer Weekly – 16 May 2023: Microsoft and Google go into battle for enterprise AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as developments in generative AI accelerate, Microsoft and Google have each unveiled plans around enterprise applications. Nobody doubts the importance of digital transformation – but experts say it won't work without cultural change as well. Read the issue now.

  • Mix and match: Overcoming cloud integration challenges

    Sponsored by: TechTarget ComputerWeekly.com

    This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.

  • Mix and match:Overcoming cloud integration challenges

    Sponsored by: TechTarget ComputerWeekly.com

    This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.

  • Choosing Between MDR, MSSP, and SIEM-as-a-Service

    Sponsored by: Arctic Wolf

    MDR, MSSP, SIEM-as-a-service: Which one is the right fit for your security operations? To help you make an informed decision, this 16-page e-book compares the approaches. Dive in to understand the strengths and weaknesses of each security strategy.

  • Computer Weekly – 24 April 2018: London plans to be a smarter city

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we meet the first ever chief digital officer for London and find out his plans to make the capital a smarter city. SAP has overhauled its controversial indirect licensing policy – we look at the implications. And what are the jobs of the future in retail as the sector is transformed by technology? Read the issue now.

  • Don't wait until it's too late: Add security to keep identity real

    Sponsored by: WatchGuard Technologies, Inc.

    A recent study found that 51% of people use the same password for work and personal accounts. Stolen credentials allow hackers to bypass your security measures, with overlapping and weak passwords making theft an even greater risk. This white paper is designed to help you find the solution right for your organization. Read on to learn more.

  • Helping businesses work smarter

    Sponsored by: AllCloud

    As an AWS Generative AI Competency Partner, AllCloud helps businesses harness the power of generative AI to improve compliance reporting, customer experience, and communications. Learn how AllCloud's solutions can transform your operations by reading the full e-book now.

  • A Computer Weekly buyer's guide to robotic process automation

    Sponsored by: TechTarget ComputerWeekly.com

    Robotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.