Search Results for "computerweekly freeform dynamicsstart=30start=10start=30start=10start=30start=30start=30"
-
The ultimate guide to identity & access management
Sponsored by: TechTarget ComputerWeekly.comBusinesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
-
Unified Communication: “It should work as easily as a telephone call!”
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
Mobile Payments Using Host Card Emulation with NFC
Sponsored by: TechTarget ComputerWeekly.comIn this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
-
Excelling In Customer Success How Leading Brands Secure Global Access And Support
Sponsored by: TeamViewerDiscover how leading brands leverage TeamViewer to secure global access and support. Learn how Specsavers, Aesop, Mercedes-AMG PETRONAS, and other enterprises drive efficiency, productivity, and sustainability with TeamViewer's remote connectivity solutions. Read the full e-book to explore their customer success stories.
-
A Computer Weekly buyer's guide to artificial intelligence in IT security
Sponsored by: TechTarget ComputerWeekly.comArtificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
A Computer Weekly buyer’s guide to artificial intelligence in IT security
Sponsored by: TechTarget ComputerWeekly.comArtificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
-
Computer Weekly – 6 September 2022: Out with the old at Asda
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.
-
9 IBM Cloud Paks for app modernization and cloud efforts
Sponsored by: TechTarget ComputerWeekly.comIt takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.
-
Jargon buster guide to hybrid cloud storage
Sponsored by: TechTarget ComputerWeekly.comIn this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.
-
Public Sector Leaders Discuss IT Infrastructure
Sponsored by: Red HatIn this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.