ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • 5 Reasons to Make Virtual Support Agent Adoption a Priority

    Sponsored by: Serviceaide

    Inside, find a list of five reasons to consider a virtual support agent, including improved service user experiences, increased automation opportunities, and more.

  • 5 Stages of Incident Management and How to Improve Them

    Sponsored by: Atlassian

    Download this guide to learn about the five core stages of the modern incident management process – and why understanding the ins-and-outs of each stage is so important in today's world.

  • 5 Steps to Transform Your IT Organization with Artificial Intelligence

    Sponsored by: Splunk

    Jump into this guide to learn the five steps it takes to get started on a big data and machine learning infused IT operations strategy – without getting bogged down by too many tools and competing IT priorities.

  • 5 Top Recommendations for Effective Threat Detection

    Sponsored by: Alert Logic

    If your organization is looking to improve the effectiveness of your threat detection program, uncover the top 5 recommendations for effective threat detection, today.

  • 5 Ways to Eliminate Help Desk Fire Drills

    Sponsored by: ServiceNow

    Without an efficient way to manage requests, data, and staff, your help desk is in trouble – especially in today's increasingly complex IT environments. Learn about 5 best practices that will get your help desk up to speed, and keep it there.

  • 5th edition of the latest trends and insights for CIOs, CTOs and CDOs.

    Sponsored by: ComputerWeekly.com

    Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.

  • 6 Point SIEM Solution Evaluation Checklist

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!

  • 6 Steps to Successful Capacity Management

    Sponsored by: BMC

    Inside this 12-page guide, uncover 6 IT infrastructure best practices that can help you smooth out capacity inconsistencies across your entire stack – including on-prem and cloud.

  • 9 Key Questions to Ask When Selecting an Incident Response Service Provider

    Sponsored by: Dell SecureWorks

    Many people associate the term "incident response" with recovery efforts following a major security breach. However, effective incident response is not just reactive, nor is it confined to major incidents. In this white paper, learn how an incident response provider can assist you with a range of prevention, detection, and response activities.

  • A Computer Weekly buyer's guide to testing and code quality

    Sponsored by: ComputerWeekly.com

    Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.

  • A Day in the Life of an IT Remote Support Agent

    Sponsored by: LogMeIn RescueAssist

    Remote support agents can’t help but take their work home with them – it’s in the job description. Click inside to step through the day-to-day life of a remote support agent as they provide critical IT support from work, home, and even the local coffee shop.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • A Guide to Digital Identity Verification: The Technology and Trends

    Sponsored by: Onfido

    An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.

  • 5 Steps to Network Situational Awareness

    Sponsored by: Lumeta Corporation

    This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

  • 8 Essentials of Business Analytics

    Sponsored by: SAS

    Leading banks use business analytics to predict and prevent credit fraud, saving millions. Retailers use business analytics to predict the best location for stores and how to stock them. But these advanced business applications tell only part of the story. What's going on inside these market-leading companies that sets them apart?

  • A Brazilian company adopts IBM System z to handle rapid business growth

    Sponsored by: IBM

    This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.

  • A CIO's Five-Point Plan for Managing Endpoint Security

    Sponsored by: Dell KACE

    Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.

  • A CIO's Top Priority

    Sponsored by: Rainforest QA Inc.

    Chances are that you see your role as CIO differently than everyone else in the company. This e-guide will help you gain perspective on what your organization is looking for you to accomplish and how to rearrange your priorities accordingly.

  • A Comprehensive Guide to Encryption Technology Approaches

    Sponsored by: Vormetric

    This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.

  • A Comprehensive Guide to the Latest Threat Detection Technologies

    Sponsored by: SearchSecurity.com

    This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.

  • A free Demonstration of Panda Cloud Systems Management

    Sponsored by: Panda Security

    Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

  • A Guide to Password Use in WebSphere Application Server

    Sponsored by: Global Knowledge

    Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

  • A Hybrid IT Approach to Virtualization & DevOps Management

    Sponsored by: Red Hat

    Here, experts illustrate the evolution of multi-use virtualization tools, and you'll discover how to benefit from a hybrid approach that combines physical, virtual, and application visibility with automation and deep infrastructure analysis. Read on to also learn how DevOps is reshaping IT vendors' offerings.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.