ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • CW EMEA - March 2023: How Sweden is accelerating digitisation

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we find out how the CIO at Dutch company SHV Holdings goes about ensuring his group IT department provides the foundations for a wide variety of businesses to thrive digitally. Read the issue now.

  • Digital Transformation In HR: The 10-Step Guide

    Sponsored by: Sage

    This 10-step guide provides a comprehensive approach to digital transformation in HR, from aligning goals to the business, to building a business case, and experimenting with new technologies. Learn how to drive business resilience and create amazing hybrid work experiences. Read the full Buyer's Guide.

  • WAF Buyer’s Guide

    Sponsored by: Fastly

    Choosing the wrong WAF can lead to high false positives, brittle AppSec configurations and high maintenance costs. That’s why having the right evaluation criteria is essential. This buyer's guide aims to bridge the information gap so you can make a confident decision.

  • MicroScope – February 2021: The forecast on channel security

    Sponsored by: MicroScope

    MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working

  • The CHRO guide to unleashing agility and bottom-line benefits

    Sponsored by: ServiceNow

    For today’s businesses, managing risk and building resilience in their HR operations has never been more important. To do so, many have turned to strengthening their employee productivity and development plans. However, many can find these methods daunting. Browse this guide to learn more.

  • MicroScope - July-August 2024: Is it worth taking a risk?

    Sponsored by: MicroScope

    In this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI

  • Everything You Need to Know About Electronic Signature

    Sponsored by: Docusign, Inc.

    This comprehensive e-book explores the benefits of adopting electronic signatures, including increased productivity, reduced costs, and a smaller environmental footprint. Learn how eSignature can streamline your business processes and drive digital transformation. Read the full e-book to discover how to get started.

  • AI-Driven SOC Transformation with Cortex XSIAM

    Sponsored by: Palo Alto Networks

    Discover how AI-driven solutions like Cortex XSIAM can transform your security operations center (SOC). Learn how leading organizations improved efficiency, reduced false positives, and accelerated incident resolution. Read the white paper to see the results XSIAM can deliver for your SOC.

  • Customer-Centric Growth in a Shapeshifting Cybersecurity Market

    Sponsored by: TechTarget

    Cybersecurity vendors that have found success while weathering the many changes occurring across the landscape have one thing in common: they put their customers at the center of everything they do. Download this e-book to gain insights to help you take advantage of the market.

  • CW APAC: Buyer's guide to SASE

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.