ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Datacentres of tomorrow: What the future holds

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the technologies that are being widely-tipped to become a mainstay of datacentres in the future. At the same time, it also touches upon some of the new and emerging technologies that look set to shake-up the way datacentres are managed, monitored, powered and cooled as well.

  • Identity Fabrics: Analysis and overview

    Sponsored by: One Identity

    This Leadership Compass evaluates solutions that can serve as a foundation for building modern Identity Fabrics. It examines the market, product functionality, vendor positions, and innovative approaches. Download the report to learn about the leading solutions for delivering integrated identity services.

  • From Silos to Symphony XDR and the New Age of Cyber Resilience

    Sponsored by: Bitdefender

    With digital infrastructure expanding and cloud technology continuing to gain traction, the tempo of the security symphony is increasing, as the increased complexity of these modernizations have led to greater risk. Extended detection and response (XDR) solutions present a potential answer to this uptick in risk. Read on to learn more.

  • Private cloud management: What enterprises need to know in 2021

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at how one company has negotiated the move from private to public cloud, while also shining a light on the challenges enterprises face when running private cloud environments and what they can do to overcome them.

  • Acceleration-Optimized Servers and Accelerator Portfolio

    Sponsored by: Dell Technologies

    In this product overview, you'll learn how to accelerate insights and innovation with Dell PowerEdge servers and accelerator portfolios. Read on now to learn how you can leverage the latest technologies like generative AI, large language models, and digital twins to outpace the competition.

  • Why Deep Observability is Foundational for NDR Success

    Sponsored by: Gigamon

    Comprehensive network visibility is essential for effective network detection and response (NDR). This solution brief explores how the Gigamon Deep Observability Pipeline can empower NDR tools with full-fidelity, decrypted data to improve threat detection and response. Read the full solution brief to learn more.

  • CW Europe - December 2021-February 2022: Norway embraces internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.

  • Privileged Access Management

    Sponsored by: One Identity

    Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.

  • Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.

  • Passkeys Primer

    Sponsored by: Okta

    Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.