ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • A Computer Weekly buyer's guide to supply chain security

    Sponsored by: TechTarget ComputerWeekly.com

    Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.

  • A Computer Weekly e-Guide to CRM

    Sponsored by: TechTarget ComputerWeekly.com

    We take a look at the fundamental do's and don'ts of Customer Relationship Management. Including examples of how companies are utilizing it to their advantage and how to avoid making mistakes in the world of building bridges with your customers.

  • RACI For SASE Success Optimizing Single-Vendor SASE Selection

    Sponsored by: Cato Networks

    The RACI matrix is a powerful project management tool you can use to optimize single-vendor SASE selection. It defines roles and responsibilities, fosters collaboration and aligns stakeholders. Read this e-book to learn how to apply the RACI matrix to your SASE project.

  • The rise of SD-WANs: Time to cross the chasm

    Sponsored by: TechTarget ComputerWeekly.com

    Where does SD-WAN stand at the beginning of the second quarter of 2022? The solid upward trajectory of SD-WANs has been given further impetus by the parallel emergence and rise of SASE, which integrates SD-WAN with edge security, and the rise persists as SD-WAN pricing becomes more competitive and monitoring capabilities become popular.

  • 6 Hiring Dashboards Every Recruiting Team Needs

    Sponsored by: GEM

    Discover the 6 hiring dashboards every recruiting team needs to centralize data, visualize trends, and optimize the hiring process. Download this white paper to learn how to build the perfect dashboard for your organization.

  • How best to put collaboration tools to work for your team

    Sponsored by: TechTarget ComputerWeekly.com

    This collection of recent expert advice aims to make your quest for the best option a bit easier. Read on and learn the latest on what collaboration tools now offer, including advanced technology like AI and speech recognition.

  • Mastering Recruitment Metrics An In-Depth Guide

    Sponsored by: GEM

    Discover how to leverage recruitment metrics to transform recruiters into talent acquisition authorities, debug hiring funnels, forecast progress, and demonstrate recruiting's impact on the business. Download the in-depth guide to learn more.

  • CW Middle East Oct to Dec 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.

  • Data Security Platforms

    Sponsored by: IBM

    The Leadership Compass report from KuppingerCole, provides an overview of the Data Security Platforms market, along with guidance and recommendations for finding the sensitive data protection and governance products that best meets clients’ requirement. Read the report here.

  • Get the Greatest ROI From Your Strategic Initiatives

    Sponsored by: ServiceNow

    The most effective way to thrive through unprecedented change is to get ahead of it. Read this e-book to learn how you can transform your digital operations and maximize ROI by enabling effective project and portfolio management on a single platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.