ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • One SOC to Rule Them All: SonicWall’s Managed Security Services

    Sponsored by: SonicWall

    Secure your entire attack surface with SonicWall's Managed Security Services. Get 24/7 SOC monitoring for endpoint, cloud, and network protection. Learn how to deliver superior security to your clients without breaking the bank - read the full white paper.

  • Why high-performing organizations prioritize flexible delivery

    Sponsored by: ServiceNow

    In this analyst report, find out why hybrid approaches have become king in the modern workplace… and why flexible delivery is becoming the difference maker for leading organizations.

  • From Patchwork To Platform

    Sponsored by: Red Hat

    This e-book examines the differences between upstream Ansible and Red Hat Ansible Automation Platform, a hardened and supported enterprise solution. Learn how the platform can enhance security, scalability, and ROI for your organization's automation needs. Read the full e-book to discover the benefits of enterprise-grade automation.

  • How to Democratize Analytics

    Sponsored by: Alteryx

    Data democratization is a challenging, ongoing process that requires a clear strategy and buy-in from crucial people within your business. Download this guide to identify and address democratization challenges, learn what you need to do to successfully democratize, and discover the ROI you could see from your efforts.

  • CW APAC – July 2021: Trend Watch: Supply Chain Security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain

  • UK police unlawfully processing over a million people's data on Microsoft 365

    Sponsored by: TechTarget ComputerWeekly.com

    The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.

  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.

  • NHS NW London CCG saves time and improves security with TeamViewer Tensor

    Sponsored by: TeamViewer

    NW London CCG was facing many challenges when it came to support, cybersecurity gaps, and centralized management. They needed a remote connectivity tool that offered instant access to servers and devices, while still being fully compliant. Download this case study to see why they chose TeamViewer, and uncover the results realized from the switch.

  • Unleashing the power of the cloud: A guide to modernizing your SQL server and .NET Applications on AWS

    Sponsored by: AWS

    In this eBook you will discover how modernizing your Microsoft SQL Server and .NET applications on AWS unlocks benefits such as increased agility, reduced total cost of ownership, developer efficiency, ad improved return on investment.

  • Computer Weekly – 27 June 2023: The politics of AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Rishi Sunak and Keir Starmer both spoke at London Tech Week to present their visions of an AI future for the UK – we compare their plans. We talk to the CTO of chip giant AMD about making tech more energy efficient. And we look at optimising networks for hybrid working. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.