ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=20start=10start=30start=20start=20"

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Hyperconverged Reference Architecture

    Sponsored by: Panduit

    In this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.

  • Focus: Artificial intelligence in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    This special report gives IT leaders a guide to the latest thinking in AI and machine learning, and looks at how these technologies could help in areas such as security, mobile, customer engagement - and even within the IT department itself.

  • Computer Weekly - 25 January 2022: Why watching your remote workers doesn't work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the surge in home working led many firms to mandate use of surveillance software – we look at why it hasn't worked. It's an important year for public sector IT – we examine the trends for 2022. And with robotic process automation (RPA) booming, a Swedish bank explains the benefits. Read the issue now.

  • SAP GRC Framework Integration with One Identity Manager

    Sponsored by: One Identity

    Built in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.

  • UX is the great enabler of public sector digitisation

    Sponsored by: Ensono Limited

    In this white paper, take a close look at how the public sector can put the citizen at the heart of plans for digitization and identity management and create flexibility and robust solutions for the future.

  • A Deep Dive into Shadow IT: Examples, Risks, and Solutions

    Sponsored by: Auvik Networks, Inc.

    Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.

  • The Enterprise Chatbot Guidebook

    Sponsored by: Boost.ai

    This comprehensive guidebook explores enterprise chatbots and conversational AI, outlining how they can automate customer service, increase sales, and boost efficiency. Learn about the history, key features, and real-world use cases across industries. Download the e-book to discover how AI-powered chatbots can transform your customer experience.

  • Security Think Tank: Critical National Infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

  • A Computer Weekly e-Guide to IAM

    Sponsored by: TechTarget ComputerWeekly.com

    We dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.