ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Privileged Access Management Maturity in the Cloud Era

    Sponsored by: Saviynt

    It’s estimated that 80% of data breaches involve privilege misuse or compromise. Gartner lists Privileged Access Management (PAM) as a critical infrastructure service and a high-priority cyber defense capability. Read this white paper to learn more.

  • Build vs Buy eBook

    Sponsored by: PatientIQ

    Launching an integrated outcomes program requires seamless integration of EHR modules, IT systems, and clinical workflows. This e-book outlines the technical requirements, workflow engine, and population health management capabilities needed to successfully implement an effective outcomes program. Read the full e-book to learn more.

  • Computer Weekly – 12 September 2023: The dangers of breaking encryption

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.

  • ERP Buyer’s Guide For Merchants and Distributors

    Sponsored by: Aptean

    This buyer's guide for merchants and distributors explains key features to look for in an industry-specific ERP system, including online integration, route optimization, EDI, warehouse management, and more. Learn how the right ERP can streamline your operations and drive growth. Read the full guide.

  • How Van Horn Improves Employee Training By 20%

    Sponsored by: T-Mobile for Business

    “Amaze Our Customers”: This is Van Horn Automotive Group’s philosophy. To continue fulfilling that mission, Van Horn set out to transform its communications system. This case study maps out the journey, breaking down how, in addition to modernizing its communications, Van Horn improved its onboarding training. Read on for more details.

  • What Health System Strategists Will Prioritize In 2024 And Beyond

    Sponsored by: The Advisory Board

    Health systems are recovering from the worst financial year in recent history. The Advisory Board’s annual strategic planners study uncovers what health system strategy leaders are planning for in the next year, and where they are focusing their energy to achieve growth. Read on to explore the top 5 findings from this year's study.

  • 5 Steps to Better Data Quality for Generative AI and Beyond

    Sponsored by: Dataiku

    Data quality is critical for successful Generative AI, but many organizations struggle with it. This white paper outlines 5 steps to improve data quality, including democratizing data quality efforts and embedding quality checks across operations. Read the full white paper to gain a competitive advantage through better data quality.

  • Netting Deeper ABM Engagement with Webinars

    Sponsored by: BrightTALK by TechTarget

    Access this guide to explore how effective video-based content can drive deeper engagement within target accounts. You’ll learn how to tailor webinars to maximize success and get tactics for activating Sales around webinar engagement signals, all to boost the performance of your ABM program.

  • A Buyer’s Guide to Enterprise Agile Planning Solutions

    Sponsored by: Digital.ai

    In this exclusive e-book, find out how Digital.ai Agility can help your organization unlock new customer products and services, optimized customer experiences, better business process insights and accelerated time to market.

  • Assess & Manage Commercial Software Risk

    Sponsored by: ReversingLabs

    How do you know the commercial software you bring into your organization is safe? With Industry analysts seeing a 300% to 1000% increase in attacks targeting the commercial software businesses, it represents the largest under-addressed attack surface. Download this White Paper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.