ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • PLM in your pocket handy and smart business processes via app

    Sponsored by: Revalize

    Discover how manufacturing companies can use app technology to centralize business processes and minimize complexity. Learn how the PRO.FILE FLEX app enables mobile access to PLM functions and information for increased efficiency and flexibility. Read the White Paper to learn more.

  • IDC MarketScape: Worldwide Governance Administration for Identity Security 2022 Vendor Assessment

    Sponsored by: SailPoint Technologies

    Traditionally, identity governance administration (IGA) was called the passive side of governance, where organizations would implement largely on premises to improve their regulatory compliance positions. This report provides an overview of the current IGA solution market, highlighting and comparing the leading vendors. Read on to learn more.

  • 5 Key Capabilities to Secure Against Endpoint Risk

    Sponsored by: CrowdStrike

    Legacy endpoint security solutions don’t just miss modern threats — they slow down security operations, drain resources, and increase overall risk. In this eBook, uncover five key capabilities for a modern endpoint security approach and see how improved detection capabilities protect against all types of threats.

  • What Does a Good Trace Look Like?

    Sponsored by: Honeycomb

    What does a good trace look like? In this e-book by Honeycomb, learn about 7 key characteristics of a successful trace and review an example of good tracing.

  • Scaling B2B Demand for Authentic Connections

    Sponsored by: BrightTALK by TechTarget

    In this eBook, learn how to effectively reach and convert targets at scale. Download your copy to explore new perspectives and methodologies on how to balance the crucial and competing needs for scale and depth of connections with your audience.

  • Building an AI strategy: Telcos put the foundations in place

    Sponsored by: AWS

    This report – based on interviews with 20 of the world’s largest and leading CSPs globally, plus a survey of 104 executives across 73 telcos worldwide – sets out to evaluate where operators are with their AI strategies and what they need to do to make them fit for the future and deployed at scale.

  • Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018

    Sponsored by: TechTarget ComputerWeekly.com

    David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.

  • Arctic Wolf Security Operations 2024 Report

    Sponsored by: Arctic Wolf

    This report provides insights on the evolving cyberthreat landscape, including trends in identity-based attacks, ransomware, and social engineering. Discover how security operations can strengthen resilience and reduce risk. Read the full report to learn actionable strategies for protecting your organization.

  • Ebook - Content Synd - Zero Trust Explained: Ultimate Guide to Zero Trust Security

    Sponsored by: StrongDM

    Download this ebook explore Zero Trust security, including its benefits, best practices, and common barriers to implementation. You’ll gain a deeper understanding of Zero Trust models like ZTAA and ZTNA and learn the tools and techniques you need to apply frictionless Zero Trust access control to your infrastructure.

  • Computer Weekly – 21 August 2018: Delivering the potential of the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.