Search Results for "Royal Holloway Information Security seriesstart=10start=10"
-
Prevention first Cloud Security Whitepaper
Sponsored by: Checkpoint Software TechnologiesWith cloud threats evolving, organizations find themselves exposed and at risk. In response, they need a new more proactive approach to cloud security. This whitepaper outlines Check Point’s new Cloud Security paradigm, which emphasizes a unique technology stack. Read on to learn more.
-
Computer Weekly - 2 November 2021: What the Budget means for UK technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look through the chancellor's Autumn Budget and Spending Review to find what it means for the UK tech sector. As COP26 starts, we assess the green credentials of the IT industry. And we hear one CTO's experiences of learning the privacy lessons of GDPR. Read the issue now.
-
A Computer Weekly buyer's guide to network cost and bandwidth optimisation
Sponsored by: TechTarget ComputerWeekly.comComing in under budget for appropriate network performance takes some strategic nous. In this 15-page buyer's guide, Computer Weekly looks at how companies can gain effective global coverage, what can be done to optimise networks in a shift towards hybrid working and why leaders should consider best practices carefully.
-
The great IAM - time to modernise?
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
-
Using IT initiatives to save money and reinforce green credentials
Sponsored by: TechTarget ComputerWeekly.comAnalyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.
-
Data Security Platforms
Sponsored by: IBMThe Leadership Compass report from KuppingerCole, provides an overview of the Data Security Platforms market, along with guidance and recommendations for finding the sensitive data protection and governance products that best meets clients’ requirement. Read the report here.
-
Guiding Your Leadership Team Through the Zero Trust Mindset
Sponsored by: CyberArkZero trust identifies users and entities and grants them just the right amount of access as needed. In this e-book, LATAM Field Technology Director at CyberArk, Cláudio Neiva, leverages his 24 years of experience to break down the essential elements of zero trust. Read on to learn more.
-
The Vital Role of Market Data Monitoring in Financial Services
Sponsored by: ITRS Group LimitedThe increasingly digitized capital markets have opened a plethora of new market data channels, which could potentially compromise data quality, control, and management unless they are well managed. In this eBook, take a closer look at market data challenges and emerging trends in market data monitoring.
-
How Leveraging Artificial Intelligence In Utilization Management Can
Sponsored by: XSOLISBy leveraging the capabilities of machine learning, healthcare organizations can quickly evaluate a patient profile against an entire database of situationally relevant cases, giving them the insights needed to determine the best course of action for each patient’s care. Read on to understand the potential of AI in utilization management.
-
Sparking ABM with the Right Data and Insights
Sponsored by: TechTarget84% of surveyed TechTarget customers reported that they are actively planning and executing ABM in their GTM strategy. So, how can businesses unlock the best results from their ABM program? For guidance, dig into this 12-page e-book penned by TechTarget’s SVP of Customer Strategy and Enablement, Jillian Coffin.