Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
The rise of the MSSP
Sponsored by: MicroScopeIn this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.
-
CW ASEAN: SD-WAN helps find best route to cloud
Sponsored by: TechTarget ComputerWeekly.comThis year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.
-
Datacentre design: Building leaner, greener server farms
Sponsored by: TechTarget ComputerWeekly.comThe need for energy efficiency, resiliency and security have, for many years, been the driving forces behind the way that operators have approached building their datacentres. In this e-guide, we take a look at how the need for energy efficiency and sustainability is altering the way operators approach their datacentre builds and designs.
-
Securing DevOps
Sponsored by: Veracode, Inc.Integrating security operations into pre-existing DevOps processes can yield numerous business benefits – including a measurable growth in both profit and revenue. Read this whitepaper to unlock the 5 principles of DevSecOps to help you get started.
-
Implementing GenAI: Use cases & challenges
Sponsored by: TechTarget ComputerWeekly.comThe use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.
-
The future of enterprise IT: Social, social, mobile, analytics and cloud
Sponsored by: TechTarget ComputerWeekly.comCloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.
-
The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business
Sponsored by: Cisco ThousandEyesToday, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.
-
The Business Value of Red Hat Solutions Versus Non-Paid Open Source Alternatives
Sponsored by: Red HatIn this IDC report, The Business Value of Red Hat Solutions Versus Non-Paid Open Source Alternatives, you’ll learn about the financial and business benefits of using Red Hat solutions. Highlights from the report include:540% three-year ROI23% faster development lifecycle for new apps52% faster security updatesRead the IDC report.
-
Acceleration-Optimized Servers and Accelerator Portfolio
Sponsored by: Dell TechnologiesIn this product overview, you'll learn how to accelerate insights and innovation with Dell PowerEdge servers and accelerator portfolios. Read on now to learn how you can leverage the latest technologies like generative AI, large language models, and digital twins to outpace the competition.
-
Calculating ROI of DCIM Monitoring for Distributed IT Sites
Sponsored by: Schneider ElectricIn this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.