Search Results for "computerweekly freeform dynamicsstart=30start=10start=10start=20start=10start=30start=20start=20"
-
CW APAC, April 2022: Trend Watch: Cyber security
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access
-
Hyperconverged Reference Architecture
Sponsored by: PanduitIn this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.
-
Focus: Artificial intelligence in the enterprise
Sponsored by: TechTarget ComputerWeekly.comThis special report gives IT leaders a guide to the latest thinking in AI and machine learning, and looks at how these technologies could help in areas such as security, mobile, customer engagement - and even within the IT department itself.
-
Computer Weekly - 25 January 2022: Why watching your remote workers doesn't work
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the surge in home working led many firms to mandate use of surveillance software – we look at why it hasn't worked. It's an important year for public sector IT – we examine the trends for 2022. And with robotic process automation (RPA) booming, a Swedish bank explains the benefits. Read the issue now.
-
SAP GRC Framework Integration with One Identity Manager
Sponsored by: One IdentityBuilt in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.
-
UX is the great enabler of public sector digitisation
Sponsored by: Ensono LimitedIn this white paper, take a close look at how the public sector can put the citizen at the heart of plans for digitization and identity management and create flexibility and robust solutions for the future.
-
A Deep Dive into Shadow IT: Examples, Risks, and Solutions
Sponsored by: Auvik Networks, Inc.Shadow IT threatens data security and compliance. In this white paper, discover examples like unapproved comms tools or personal devices, and learn how to tackle shadow IT risks and solutions.
-
The Enterprise Chatbot Guidebook
Sponsored by: Boost.aiThis comprehensive guidebook explores enterprise chatbots and conversational AI, outlining how they can automate customer service, increase sales, and boost efficiency. Learn about the history, key features, and real-world use cases across industries. Download the e-book to discover how AI-powered chatbots can transform your customer experience.
-
Security Think Tank: Critical National Infrastructure
Sponsored by: TechTarget ComputerWeekly.comWe asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
-
A Computer Weekly e-Guide to IAM
Sponsored by: TechTarget ComputerWeekly.comWe dive straight into the importance of Identity and Access Management and its importance in modern day IT. We also take a close look into how it can bolster companies' compliance and will be running you through the do's and don'ts of taking interviews about IAM.