ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=10start=20start=30start=10start=30"

  • Want to Secure Your Hybrid Workforce with ZTNA?

    Sponsored by: Zscaler

    Given the crowded nature of the zero trust network access (ZTNA) market, security professionals are forced to decipher what makes one ZTNA product stand apart from the rest. To find out 10 key, standout features of a ZTNA solution, review this e-book.

  • Financial Planning's Transitional Phase: What to Expect

    Sponsored by: Centage

    CFOs are transitioning away from spreadsheets to budgeting, planning and forecasting (BP&F) software. Change is difficult, but necessary to success. Learn why Hames Corp. CFO Max Rule considers himself a "change agent" and what that means, and discover the importance of BP&F software for streamlining business processes.

  • A 7-Step Risk Assessment Framework For Cybersecurity Professionals

    Sponsored by: VikingCloud

    Cybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.

  • 5 Tips for Using Gen AI to Improve Your Customer Experience Web Amp

    Sponsored by: SAS + AWS

    This presentation transcript explores how to leverage generative AI to enhance customer experiences. Inside, you'll learn about data requirements, content creation, ideation, and customer engagement. Read on now to discover proven strategies for successful AI implementation.

  • How To Deploy A Password Policy

    Sponsored by: Specops Software

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

  • From Alteryx to Dataiku: Streamlining Your Data Workflow eBook

    Sponsored by: Dataiku

    As the digital landscape continues to evolve, businesses are finding that traditional data platforms, while powerful, may not be sufficient to meet the growing demand for scalability, collaboration, and advanced analytics. Read this e-book now to learn how you can ensure that your data processing pipelines are primed for future success.

  • Data protection, a live issue that affects us all

    Sponsored by: TechTarget ComputerWeekly.com

    Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

  • 2024 Playbook: Identity Security and Cloud Compliance

    Sponsored by: CyberArk

    How can organizations minimize compromised access in the cloud? This white paper covers identity security and the challenges and benefits of cloud compliance to reduce security risk. Read on to learn about best practices to secure identities in the cloud as well as three phases to achieve cloud identity security success.

  • Sensible one-page thoughts on managing performance

    Sponsored by: TechTarget ComputerWeekly.com

    Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of short, digestible articles, written especially for Computer Weekly.

  • Enabling trusted AI Enabling trusted AI and data-driven decisions at scale

    Sponsored by: SAS

    This e-book explores how SAS Viya, a cloud-native data and AI platform, helps organizations manage the data and AI life cycle to operationalize automated, intelligent decisioning at scale. Read on now to learn how SAS Viya empowers teams to build trusted models and govern them for faster, more transparent decisions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.