Search Results for "big data computer weeklystart=20start=20start=30start=20"
-
Passwordless: Identity Threat’s Nightmare
Sponsored by: CyberArkIf you are wondering where to start your passwordless journey, this eBook is for you. While focusing on best practices in securing both the workforce and high-risk users, it explores different options for passwordless authentication, the specific security and compliance tradeoffs they entail, and more.
-
Remote Support – Without Limits
Sponsored by: TeamViewerTo ensure smooth operations, a leading clothing retailer in Germany, Ernsting’s family, set out to find a remote support platform that could support tablets and workstation PCs. In this case study, chart the retailer’s journey to success.
-
Getting Started with Zero Trust Access Management
Sponsored by: OktaFor businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.
-
Five AWS data migration methods to consider
Sponsored by: New RelicMore organizations than ever are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data to the cloud isn't always straightforward. This exclusive e-guide reveals five data migration methods to move storage to AWS.
-
Resilient Cybersecurity with Network Detection and Response
Sponsored by: Progress Software CorporationNetwork Detection and Response (NDR) solutions have emerged to plug common gaps in cybersecurity protection. Discover NDR’s benefits, the NDR market landscape according to Gartner, and a review of the Progress Flowmon ADS solution in this white paper.
-
Endpoint security: Hybrid work changes the game
Sponsored by: TechTarget ComputerWeekly.comA scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not. In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.
-
Build a Better Webinar Day of Execution
Sponsored by: BrightTALK by TechTargetYou've spent weeks preparing for your webinar and done most of the heavy lifting before your go-live day. Now it's show time! Ensuring everything goes smoothly during your webinar is key to delivering a positive and engaging audience experience. Browse this e-book to learn more.
-
SAP GRC Framework Integration with One Identity Manager
Sponsored by: One IdentityBuilt in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.
-
A Computer Weekly buyer's guide to data quality
Sponsored by: TechTarget ComputerWeekly.comThe value of data depends on its quality. In this 14-page buyer's guide, Computer Weekly looks at how the coronavirus pandemic has highlighted the challenges of inaccurate datasets, the new analytics techniques improving data quality and Informa's use of Collibra software
-
Virtual currencies and their potential role in cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.