ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computerweekly freeform dynamicsstart=30start=10start=20start=30start=10start=20start=10start=10"

  • Build a Better Webinar: Recruiting and Prepping Speakers

    Sponsored by: BrightTALK by TechTarget

    To produce a successful webinar, you need an effective speaker. However, presenting key information in a clear, concise, and engaging way can sometimes be easier said than done. Access this guide for essential tips and tricks for prepping and recruiting your webinar speakers.

  • Defining and Using Master Data Management

    Sponsored by: Rackspace Technology

    PH

  • Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform

    Sponsored by: CyberArk

    Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

  • The Buyer's Guide to Complete Cloud Security

    Sponsored by: CrowdStrike

    To combat the sheer volume and evolving sophistication of modern cloud attacks, organizations need to take a smarter and faster approach to cloud security. This buyer’s guide captures the definitive criteria for choosing the right cloud-native application protection platform (CNAPP) and partner.

  • The Operational Efficiency of Hybrid Cloud Deployments and Management

    Sponsored by: Nutanix

    This Enterprise Strategy Group technical validation examines how Nutanix Cloud Clusters (NC2) provides repeatable automation, simplifies workload management, and improves TCO and agility for hybrid cloud deployments. Learn more in the full report.

  • Public Sector Cyber Defense Guide

    Sponsored by: CyberMaxx

    Cyberattacks on public sector entities are growing in complexity and frequency. To stay secure in the future, organizations should consider adopting a defense-in-depth approach. Download this full e-book now to discover detailed strategies to fortify your cybersecurity efforts.

  • The ultimate enterprise SIP buyer’s guide

    Sponsored by: Sinch

    Explore the benefits of cloud-based SIP trunking for your enterprise, including cost savings, enhanced collaboration, and improved scalability. Discover if SIP trunking is the right solution for your business needs. Read the full guide to learn more.

  • 7 Compelling Reasons Why Analysts Recommend SASE

    Sponsored by: Windstream Communications

    In order to keep up with the evolving security landscape, analysts recommend SASE for its convergence of networking and security, gradual migration path, and ability to future-proof businesses. Access the e-book to discover more.

  • Virtual currencies and their potential role in cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.