ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • 3 STEPS TO MANAGE TECHNOLOGY SPEND AND RISK

    Sponsored by: ServiceNow

    In this e-book, discover a practical, 3-step approach to optimizing technology spend and mitigating risk.

  • The Buyer’s Guide For AI & Cloud Skills Development

    Sponsored by: QA

    In this buyer's guide, you'll discover how to find the right technology skills development software to upskill your team for cloud and AI. You'll also learn about key features, the buying process, and how to narrow down your vendor decision. Read on now to uncover the best fit for your organization.

  • A Computer Weekly buyer's guide to expense management

    Sponsored by: TechTarget ComputerWeekly.com

    Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings

  • How Managed XDR Bolsters Businesses’ Cybersecurity Posture

    Sponsored by: NCC Group

    As the network perimeter is now everywhere, security must move with it and be in place at the point of access. Learn how Managed XDR can bolster your business's cybersecurity posture - download the e-book.

  • Computer Weekly – 6 February 2018: How a digital workplace can drive innovation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now.

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • Computer Weekly - 1 November 2022: How the pandemic accelerated tech adoption in hospitality

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the hospitality sector was devastated by the pandemic, and it's turning to technology to rebuild – we find out what's changing. Google's cloud business is growing but remains well behind the market leaders – what does its future look like? And we look at the benefits of AIOps for storage. Read the issue now.

  • We Solved the Infrastructure Access Problem

    Sponsored by: StrongDM

    In this e-book, you’ll learn how several organizations, from growing startups to established enterprises, solved the access problem using StrongDM. Read now to access their case studies and see how you could follow in the footsteps of their success.

  • MicroScope – September 2019: Helping digital transformation

    Sponsored by: MicroScope

    The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future

  • Toughening up web and mobile application security

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.