Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
Privileged Access Management
Sponsored by: One IdentityRead this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
-
Passkeys Primer
Sponsored by: OktaSynced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.
-
Hyper-converged infrastructure vs traditional: the pitfalls and benefits of a storage move
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we give an overview to buying hyper-converged in which we dig into its benefits, such as ease of deployment, resource efficiency, low Opex costs and reduced use of datacentre space. But we also look at the potential pitfalls that include the difficulties of troubleshooting in a tightly-layered environment.
-
Identity Fabrics: Analysis and overview
Sponsored by: One IdentityThis Leadership Compass evaluates solutions that can serve as a foundation for building modern Identity Fabrics. It examines the market, product functionality, vendor positions, and innovative approaches. Download the report to learn about the leading solutions for delivering integrated identity services.
-
How the application integration landscape is changing
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.
-
Multi-Factor Authentication Deployment Guide
Sponsored by: OktaThreat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.
-
Quocirca: Selecting a cloud printing platform
Sponsored by: TechTarget ComputerWeekly.comAs IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
-
Jargon buster guide to hybrid cloud storage
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.
-
Data Security Platforms
Sponsored by: IBMThe Leadership Compass report from KuppingerCole, provides an overview of the Data Security Platforms market, along with guidance and recommendations for finding the sensitive data protection and governance products that best meets clients’ requirement. Read the report here.
-
TechTarget's Guide to Managing Multiple AWS Accounts and Resources
Sponsored by: TechTarget Cloud ComputingManaging multiple AWS accounts can be challenging, but this guide simplifies the process. Learn best practices for using AWS Organizations, resource hierarchy, and AWS Control Tower to streamline account management, governance, and automation for more efficient cloud operations.