ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • How Zero Standing Privileges Enable Secure and Seamless Cloud Development

    Sponsored by: CyberArk

    Explore how Zero Standing Privileges can help secure developer access in the cloud without compromising their velocity. Learn how to maximize risk reduction through granular controls over time, entitlements, and approvals. Read the White Paper to discover a security approach that enables developer success.

  • A Computer Weekly buyer's guide to applications of next-generation networking

    Sponsored by: TechTarget ComputerWeekly.com

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses

  • Revolutionising cybersecurity for tomorrow’s threats

    Sponsored by: Lumen

    Cyber threats are rapidly evolving, requiring a proactive, holistic approach to cybersecurity. Read this white paper to learn how Lumen's Advanced Managed Detection and Response (AMDR) solution combines asset visibility, continuous vulnerability management, and threat hunting to build a resilient security posture.

  • The Ultimate Guide to Enterprise Content Management

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.

  • 6 user authentication types to secure networks

    Sponsored by: TechTarget ComputerWeekly.com

    The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.

  • Palexy delivers scalable retail video analytics with Google Cloud VMs featuring AMD EPYC™ CPUs

    Sponsored by: Google Cloud & AMD

    Along with providing security data, cameras in retail environments offer insights about how to optimally place products. Palexy’s mission is to help retailers harness those advanced video analytics capabilities. Check out this case study to learn about the powerful compute infrastructure that supports Palexy’s mission.

  • Computer Weekly – 28 November 2023: Datacentres or green belt? Why the UK has to choose

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the minefield around datacentre planning permission across the UK, after government blocked a major development next to the M25. The metaverse is making inroads into the industrial world – is this the real future for the technology? And we analyse the trends changing the app market. Read the issue now.

  • CW Middle East: UAE faces IT recruitment challenge

    Sponsored by: TechTarget ComputerWeekly.com

    With a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.

  • Modernize your IT with Cloud Services

    Sponsored by: Red Hat

    Accelerate cloud-native app development while reducing complexity. Learn how to establish a cloud management strategy, simplify cloud operations, and modernize with Red Hat OpenShift cloud services. Download the e-book to discover how to focus on cloud innovation instead of infrastructure management.

  • Financial applications automation – promise is real but needs business nous

    Sponsored by: TechTarget ComputerWeekly.com

    The automation of the financial software that lies at the heart of any business – accountancy, budget management, general ledger, payroll, and so on – is a prize many organisations are eyeing up, with machine learning and robotic process automation close to mind. Find out everything you need to know by downloading this PDF E-Guide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.