Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Jargon buster guide to database management
Sponsored by: TechTarget ComputerWeekly.comThis Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.
-
What is AWS? The ultimate guide to Amazon Web Services
Sponsored by: TechTarget Cloud ComputingWhat is Amazon Web Services? Find out in TechTarget's guide. Learn about AWS's key services, benefits, pricing, and real-world use cases to see how it drives scalability and innovation. Perfect for anyone looking to expand their cloud strategy.
-
Jargon Buster Guide to Container Security
Sponsored by: TechTarget ComputerWeekly.comThe definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
-
Nimble Storage Pricing Gets New On-Demand, Cloud-Like Option
Sponsored by: Nimble StorageIn this expert-guide, learn about Nimble Storage's new cloud-style pricing model for their all-flash and hybrid storage arrays, as well as some other new features like support for Docker containers, predictive analytics, and more.
-
IAM: Key to security and business success in the digital era
Sponsored by: TechTarget ComputerWeekly.comAs more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
-
Cloud networking and CDN: How to get the best for your business
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).
-
Calculating ROI of DCIM Monitoring for Distributed IT Sites
Sponsored by: Schneider ElectricIn this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.
-
The vulnerability of backup in a predominantly remote + cloud world
Sponsored by: TechTarget ComputerWeekly.comBackup is fundamental to IT, but things have changed a lot recently. The pandemic has had a key impact in this. In this e-guide we look at the effects of the pandemic on backup, including the increased prevalence of remote working and use of the cloud.
-
Endpoint Protection Buyer’s Guide
Sponsored by: CrowdStrikeExplore the critical capabilities required for modern endpoint protection, including AI-powered prevention, advanced detection and response, identity threat detection, threat intelligence, and managed threat hunting. Download the Endpoint Protection Buyer's Guide to learn how to secure your organization against today's sophisticated threats.
-
A Computer Weekly buyer's guide to supply chain security
Sponsored by: TechTarget ComputerWeekly.comOrganisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.