ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • A Guide for Identity Governance and Administration Programs

    Sponsored by: One Identity

    Organizations are rapidly accruing new digital identities, leading to a demand for more sophisticated identity security. This white paper presents a guide for IGA programs, showing you how to implement an IGA program from beginning to end. Download the guide now to learn more.

  • 4 Benefits of Just-In-Time (JIT) Privilege

    Sponsored by: One Identity

    As the de facto authentication method for many enterprises, Active Directory (AD) is a consistent target for cybercriminals. Just-In-Time Privilege from One Identity is designed to protect within AD by removing access to those not currently using the privilege. Download this white paper to learn more about Just-In-Time Privilege.

  • Cyber Help (And Hope) For K-12 Targets

    Sponsored by: SonicWall

    Because K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.

  • 5 Strategies and Business Benefits of SLOs

    Sponsored by: Nobl9

    If achieving 100% is impossible, then why should you strive for it? The answer is you shouldn’t - and that’s where service level objectives (SLOs) come in. Tune into this webinar now to discover 5 strategies and business benefits of SLOs that can aid in making your software more reliable.

  • Cisco Protects the Bridge to the Possible by Holistically Securing Human and Non-human Identities

    Sponsored by: CyberArk

    Cisco uses the CyberArk Identity Security platform to provide dynamic and one-click privileged access that staff need to deliver and develop services to customers and to accelerate and secure DevOps pipelines with a dynamic secrets management strategy.

  • Strata Network Security Buyer’s Guide

    Sponsored by: Palo Alto Networks

    In this e-book, discover the essential buyer’s guide to network security solutions, and the secrets to creating security RFPs that get results.

  • Disrupt your workday: Tools for teamwork in a distributed world

    Sponsored by: Atlassian

    In today’s hybrid era, many organizations are looking for ways that they can better manage their distributed teams across all time zones. However, this is easier said than done, and without the correct tools, can be difficult for most companies. Tune into this webinar to learn more.

  • Microsoft Teams Phone PSTN Buyer’s Guide

    Sponsored by: 8x8

    Download this concise e-book for a buyer’s guide that describes Microsoft Teams’ PSTN integration choices. You will learn about the advantages and drawbacks of each without drowning in the details or losing sight of your original goal—to add voice service to Microsoft Teams.

  • Contact Center Buyer’s Checklist

    Sponsored by: 8x8

    Use this checklist to benchmark the most important features of contact center solutions against your own requirements, and discover solutions that can help boost your contact center efficiency.

  • UCaaS Buyers’ Checklist

    Sponsored by: 8x8

    The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.

  • 8x8 Operator Connect for Microsoft Teams

    Sponsored by: 8x8

    Visit this blog post to find out the differences between Operator Connect and Direct Routing as a Service, and find out which solution is right for your organization.

  • Contact Center Technology Trends

    Sponsored by: Intervision

    The contact center of the future is powered by innovative technologies like AI, IoT, and UCaaS. Learn how to transform your contact center experience by leveraging the latest trends in this informative blog post.

  • What Do You Get Out of a Contact Center “Proof of Concept” With Amazon Connect (ConnectIV CX™)?

    Sponsored by: Intervision

    A proof of concept (POC) bridges the gap between marketing-type value propositions and concrete use-case definition and planning. ConnectIV CX delivers a modernized, cloud-based contact center solution, and implements a POC approach to identify relevant use cases and reverse engineer an approach that meets your needs. Read on to learn more.

  • Top ten Reasons to Achieve Data Access Governance

    Sponsored by: One Identity

    It’s time to use a secure data governance strategy to protect your sensitive data and reduce risk. This e-book explores 10 reasons to adopt a data access governance strategy. Download now to learn more.

  • Continuous Governance to Secure your Enterprise

    Sponsored by: One Identity

    Identities and access need to be managed in order to meet compliance standards and endure the long-term security of your organization. This e-book describes how your organization can achieve secure, continuous compliance through an identity governance framework. Read on to learn more.

  • Unified Communications Buyers’ Guide

    Sponsored by: 8x8

    In this e-book, explore the key themes and concepts organizations should consider when selecting Unified Communications as a Service (UCaaS) technology.

  • Contact Center-as-a-Service MetriRank 2023

    Sponsored by: 8x8

    In this analyst report, discover how the top-ranking CCaaS solutions stack up against the competition, and find out which solution is best for your enterprise.

  • Closing The Gaps In Your Ransomware Strategy

    Sponsored by: Intervision

    As ransomware threats continue to surge, cybercriminals are using advanced tactics, which are crippling businesses. In fact, 66% of companies were hit in the past year, making it critical for organizations to have the right measures in place to combat them. Access this white paper to learn more.

  • SMS verification explained

    Sponsored by: Sinch

    Despite advancements in digital security, nearly 20% of passwords worldwide are compromised each year. To combat this, many organizations have turned to adding more layers of authentication, including SMS verification. But what exactly is SMS verification? Browse this article to learn more.

  • SAP GRC Framework Integration with One Identity Manager

    Sponsored by: One Identity

    Built in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.

  • How to Manage Unwanted guests in Azure Active Directory

    Sponsored by: One Identity

    Guests in Azure Active Directory-controlled infrastructure need to be treated like the security threats they are. One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Read on to learn more.

  • Your Anti-Phishing Checklist Tips for Your Tacklebox

    Sponsored by: SonicWall

    As phishing attacks advance, so must your defenses. To help you boost your defenses, this 8-point anti-phishing checklist supplies actionable guidance, such as to carefully check a sender’s email address before interacting. Keep reading to discover the rest.

  • Understanding Gmail And Yahoo’s New Standards For Senders

    Sponsored by: Sinch

    Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.

  • Unveiling the Future: Transforming CX Across the Organization with Powerful Insights

    Sponsored by: 8x8

    In this blog post, discover how with the 8x8 Customer Interaction Data Platform (CIDP), you can gain the insights needed to address these questions and optimize your customer’s experience while simultaneously making customer-facing teams more knowledgeable and effective.

  • Elevate Customer Engagement with 8/8 EngageTM

    Sponsored by: 8x8

    Discover in this blog post how you can elevate customer engagement with 8x8 Engage, supporting your customers with a carefully-engineered solution that delivers tailored capabilities traditionally reserved for the contact center.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.