ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10"

  • Converging Cloud Security With Enterprise Security Operations

    Sponsored by: Google

    In this white paper, TechTarget’s Enterprise Strategy Group (ESG) Practice Director, Melinda Marks, looks at bridging the gap between proactive and reactive security with the convergence of cloud security. Download the ESG white paper and see how unified cloud security and SecOps can lead to a more effective overall security strategy.

  • Optimize Transfer Center Practices to Improve Patient Acquisition

    Sponsored by: Conduit

    Centralized patient transfer centers can help hospitals streamline admission processes, reduce ED boarding, and improve patient outcomes. Learn how to optimize your transfer center practices and enhance patient acquisition through data-driven strategies. Read the full white paper.

  • UPSTACK DIGEST Cybersecurity

    Sponsored by: Upstack, Inc.

    This complimentary digest is filled with advice from UPSTACK experts in the trenches of today’s cyberwar.

  • MicroScope – November 2019: The growing SD-WAN opportunity

    Sponsored by: MicroScope

    After plenty of hype, SD-WAN technology is delivering revenues for the channel as it continues to rapidly grow

  • Charting Cloud's Next Phase: Accelerating Modernization

    Sponsored by: AWS & Softserve

    Enterprises need a solution that delivers on key business priorities like optimized costs, improved security, and faster time to market. In this white paper, you'll learn how SoftServe's App Modernization Platform can simplify and accelerate your cloud migration and modernization journey. Read on now to learn more.

  • Quarterly Cyber Threat Bulletin

    Sponsored by: Coalition

    Check out this white paper to learn about 4 major cyber threats from Q3 2024 – and how to defend against them.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    How do you know the commercial software you bring into your organization is safe? With Industry analysts seeing a 300% to 1000% increase in attacks targeting the commercial software businesses, it represents the largest under-addressed attack surface. Download this White Paper to learn more.

  • The Definitive Guide to Cost-Effective AI

    Sponsored by: Domino

    To succeed in this AI-centric business world, it is important to not only leverage the power of AI but to do so responsibly and cost-effectively. In this e-book, you will discover the importance of a data science and AI platform’s role in optimizing ROI. Read on to learn how you can build trust and reputation with customers and stakeholders.

  • The Business Value of Zscaler Data Protection

    Sponsored by: Zscaler

    Businesses are racing to embrace cloud and mobility. This new study from IDC demonstrates how Zscaler Data Protection solutions ensures effective and efficient data security. Organizations using Zscaler described improving data security regardless of user location or means of access. Download the report today!

  • The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise

    Sponsored by: Dataiku

    This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.