ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"

  • Containerized Deployments On Amazon Web Services

    Sponsored by: TIBCO

    Preparing your organization for the cloud requires a level of security and agility that some enterprises find difficult to maintain. Check out this data sheet to examine how your enterprise can safely and swiftly launch into the cloud leveraging containerized deployments on Amazon Web Services (AWS).

  • CW APAC, April 2021: Trend Watch: IoT in India

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.

  • How Does Your Sales Development Program Measure Up?

    Sponsored by: TechTarget

    To understand the factors leading to poor SDR retention, TechTarget, Tenbound and RevOps Squared surveyed 218 sales leaders. Review the findings in this report, “How Does Your Sales Development Program Measure Up?”

  • Why Enterprise Linux is Becoming More Relevant for Hybrid Cloud

    Sponsored by: Red Hat

    Tap into this IDC report to discover 5 reasons why Enterprise Linux is becoming more relevant for hybrid cloud.

  • Choose The Right Path For Your Company’s Automation Journey

    Sponsored by: Red Hat

    In the spirit of open, find in this e-book a compilation of success stories from Red Hat customers who use infrastructure automation to create repeatable instructions and processes that replace or reduce human interaction with IT systems.

  • Safely innovate at speed with low-code technologies

    Sponsored by: Avanade

    Explore how low-code technologies like Microsoft Power Platform can help business and IT teams innovate quickly while maintaining governance and security. Learn how a Center of Excellence approach can unlock business value. Read the full white paper to discover more.

  • Innovate With Automation A Red Hat Customer Success Series

    Sponsored by: Red Hat

    This collection of customer success stories explores how organizations across industries used Red Hat Ansible Automation Platform to address challenges, boost efficiency, and drive innovation. Learn how automation can help your organization unify people, processes, and technology. Read the success stories.

  • Object Storage Systems in Demand for Big Data, Archiving

    Sponsored by: Cleversafe

    In this guide, Ellen O'Brien – the Executive Editor for SearchStorage.com – discusses how object storage is in high-demand for archiving and analyzing big data. Discover how metadata capabilities are propelling object storage beyond cloud storage and into a number of new and exciting use cases.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: TechTarget ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

  • The Public Sector’s Guide to Privilege

    Sponsored by: CyberFOX

    Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.