ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • A Computer Weekly e-guide on Network Visibility, Performance and Monitoring

    Sponsored by: TechTarget ComputerWeekly.com

    Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.

  • Harden Your Systems Using CIS and DISA STIGs Benchmarks

    Sponsored by: Progress Software Corporation

    Organizations face the challenge of securing complex multi-cloud environments. Chef Compliance automates system hardening and compliance with CIS Benchmarks and DISA STIGs. This guide illustrates how you can use Chef Compliance to achieve system hardening by mapping CIS and DISA benchmark standards to automated controls. Dive into the guide here.

  • MicroScope – May 2020: Staying connected

    Sponsored by: MicroScope

    In this issue, read about how the channel is helping customers stay connected during the pandemic, with Covid-19 raising hardware as businesses aim to provide technology for home workers. Also discover the benefits of SD-WAN and learn about the top compliance concerns for the coming year

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Sponsored by: TechTarget ComputerWeekly.com

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

  • How do you solve a problem like security training?

    Sponsored by: TechTarget ComputerWeekly.com

    In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

  • Fujitsu Integrated Report 2023

    Sponsored by: Fujitsu

    What is the Fujitsu Way, and what does it actually look like in practice for organizations looking to promote sustainable transformation? Take a deep dive into Fujitsu’s inner workings in this comprehensive e-book.

  • Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.

  • Red Hat OpenShift Service On AWS Enables Innovation And Agility For Modern Business

    Sponsored by: Red Hat

    Red Hat OpenShift Service on AWS enables organizations to accelerate application delivery and improve operational efficiency. Key benefits include 65% reduction in development time, 50% less infrastructure management effort, and improved operational efficiency. Read the full study to learn more.

  • The Business Value of Google Cloud IaaS

    Sponsored by: Google Cloud & AMD

    In this IDC white paper, discover how Google IaaS can help your organization realize significant business value and a 318% 5-year return on investment.

  • The Business Value of Google Cloud IaaS

    Sponsored by: Google Cloud And Intel

    In this IDC white paper, discover how Google IaaS can help your organization realize significant business value and a 318% 5-year return on investment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.