Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Containerized Deployments On Amazon Web Services
Sponsored by: TIBCOPreparing your organization for the cloud requires a level of security and agility that some enterprises find difficult to maintain. Check out this data sheet to examine how your enterprise can safely and swiftly launch into the cloud leveraging containerized deployments on Amazon Web Services (AWS).
-
CW APAC, April 2021: Trend Watch: IoT in India
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.
-
How Does Your Sales Development Program Measure Up?
Sponsored by: TechTargetTo understand the factors leading to poor SDR retention, TechTarget, Tenbound and RevOps Squared surveyed 218 sales leaders. Review the findings in this report, “How Does Your Sales Development Program Measure Up?”
-
Why Enterprise Linux is Becoming More Relevant for Hybrid Cloud
Sponsored by: Red HatTap into this IDC report to discover 5 reasons why Enterprise Linux is becoming more relevant for hybrid cloud.
-
Choose The Right Path For Your Company’s Automation Journey
Sponsored by: Red HatIn the spirit of open, find in this e-book a compilation of success stories from Red Hat customers who use infrastructure automation to create repeatable instructions and processes that replace or reduce human interaction with IT systems.
-
Safely innovate at speed with low-code technologies
Sponsored by: AvanadeExplore how low-code technologies like Microsoft Power Platform can help business and IT teams innovate quickly while maintaining governance and security. Learn how a Center of Excellence approach can unlock business value. Read the full white paper to discover more.
-
Innovate With Automation A Red Hat Customer Success Series
Sponsored by: Red HatThis collection of customer success stories explores how organizations across industries used Red Hat Ansible Automation Platform to address challenges, boost efficiency, and drive innovation. Learn how automation can help your organization unify people, processes, and technology. Read the success stories.
-
Object Storage Systems in Demand for Big Data, Archiving
Sponsored by: CleversafeIn this guide, Ellen O'Brien – the Executive Editor for SearchStorage.com – discusses how object storage is in high-demand for archiving and analyzing big data. Discover how metadata capabilities are propelling object storage beyond cloud storage and into a number of new and exciting use cases.
-
Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
Sponsored by: TechTarget ComputerWeekly.comLast year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
-
The Public Sector’s Guide to Privilege
Sponsored by: CyberFOXCybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.