ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=20start=20start=20start=10"

  • Detect, Investigate, and Respond: Reduce Financial Crime and Fraud in Financial Services

    Sponsored by: Splunk

    The Splunk Fraud and Crime Outcome Brief details how financial institutions can leverage Splunk's advanced data aggregation and machine learning capabilities to detect, investigate, and respond to financial fraud and crime.

  • Steering the Shift of Software Innovation

    Sponsored by: AWS

    What opportunities do the cloud and SaaS provide for software developers? Download this e-book to discover 8 of them and to learn about a partner that can help your software developers realize the benefits.

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • Practical Zero Trust Implementing Protections for High-Value Data

    Sponsored by: Zentera Systems Inc.

    This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.

  • CW Middle East Oct to Dec 2017

    Sponsored by: TechTarget ComputerWeekly.com

    This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.

  • The Public Sector’s Guide to Privilege

    Sponsored by: CyberFOX

    Cybercriminals target public institutions like schools and government agencies due to sensitive data and weak security. This e-book examines cybersecurity oversights, attack impacts, and how privileged access and password management solutions can reduce risks. Read the full e-book to learn how you can strengthen your organization's defenses.

  • CW Benelux November 2019-January 2020: Dutch banks fight money laundering

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

  • SHEDDING LIGHT ON OEM STORAGE SUPPORT

    Sponsored by: Service Express

    If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.

  • The Data Integration Advantage: Building A Foundation For Scalable AI

    Sponsored by: Software AG

    As enterprises scale AI, data integration is critical to overcoming challenges like data silos, quality, and security. This white paper explores how modern data integration solutions can provide the foundation for successful, scalable AI initiatives. Learn more by reading the full white paper.

  • The Hidden Costs of Downtime

    Sponsored by: Splunk

    Downtime and service degradation create a cascade of consequences, costing Global 2000 companies $400B annually. Learn how the most resilient organizations set themselves apart from the rest and Splunk’s recommendations for deterring downtime in this first-of-its-kind report in partnership with Oxford Economics.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.