ComputerWeekly.com Research Library

Powered by Bitpipe.com

IT Management Research

  • All Together Now: IT & Security Collaboration

    Sponsored by: ServiceNow

    2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.

  • Infrastructure trends facing North American midmarket organizations

    Sponsored by: Red Hat

    This InfoBrief seeks to enlighten IT practitioners of North American mid-market organizations on key trends impacting IT environments and the role of server operating system environments (S-OSEs).

  • Enabling the Remote Workforce

    Sponsored by: Cox Communications, Inc.

    Recently Microsoft has reported a 775% increase in cloud-based remote work services—a fact that highlights the resounding need for organizations to adapt to cloud-enabled work demands. Dive into this webinar to learn more about the shifting paradigm of cloud-based remote work—and how to catch your organization up to speed.

  • Making Strategic Investments in Artificial Intelligence: What Are You Waiting For?

    Sponsored by: Logicalis

    AI investments can lead to impressive economic and operational results—that much is no secret. It’s determining the best AI investment strategy that trips up most organizations. Dive into this guide to assess the real-world opportunities provided by AI tech—and get advice on taking the initial steps into an AI investment.

  • The VeriStor Difference

    Sponsored by: VeriStor

    When upgrading your data center hardware or IT solutions, it’s important to leave room for innovation and future growth. Read on to learn how VeriStor partners with their clients and complements their current and future vision with a technical roadmap full of recommended data center, security, cloud and data solutions for each use case.

  • Global Phishing Pandemic? You Be the Judge.

    Sponsored by: Inky Technology

    Since the start of the COVID-19 health crisis, complaints to the FBI’s Internet Crime Complaint Center (IC3) have more than tripled. Why are there so many of these coronavirus-related email phishing threats and where are they coming from? View this article to get a link to a free report of COVID-19 phishing examples around the world.

  • Beyond Digital Transformation: Becoming Cloud Native

    Sponsored by: Red Hat

    84% of organizations that use containers are using them in production environments. The bad news is that creating a production-ready environment can be quite the challenge. The good news? Dell Technologies and TechTarget have created a collaborative guide to help you navigate these challenges.

  • Can Your CIAM Solution Keep Up with the Market?

    Sponsored by: Okta

    Organizations must now respond to increasingly complex requirements to deliver seamless omnichannel experiences for their customers. But they must also work harder to keep sensitive customer data secure. To take customer security to the next level, view this webcast to learn more about customer identity access management.

  • For Everything-as-a-Service: HPE GreenLake is at Your Service

    Sponsored by: Datacentrix and HPE

    Consumption-based IT services are an easy way to ensure that your company is only spending what’s needed--freeing up more resources for value-adding tasks instead. Unsure what consumption-based IT has to do with costs? Dive inside to learn more.

  • Environmental Impact of Shifting to ITaaS

    Sponsored by: Datacentrix and HPE

    New cloud computing and IT-as-a-service (ITaaS) models can have a remarkable impact on the efficiency and ultimate carbon footprint of IT infrastructure. Jump inside this brief resource to take a closer look at the environmental impacts of the cloud.

  • Webinar: DevOps to NoOps

    Sponsored by: Dynatrace

    In 2004, Dynatrace was asked what monitoring will look like in 2020. Even then, they knew that monitoring needed a transformation larger than the product itself. Now, hear from Dynatrace’s CTO Bernd Greifeneder as he discusses the changing world of monitoring, and how software management, deployment, and support has changed with it.

  • Endpoint Security for Smart Manufacturing: Protection from the Factory Floor To the Supply Chain

    Sponsored by: BlackBerry

    Manufacturers have embraced digital transformation, which means they’re now capturing more and more data on many new and different types of endpoints, both in their factories and throughout their logistics channels. But with all that data comes added security risks. Jump into this white paper to look at these threats and their implications.

  • CEO Impersonation

    Sponsored by: Inky Technology

    Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.

  • Report: Build the Business Case for Cybersecurity and Privacy

    Sponsored by: Okta

    Mega data breaches will often spur organizations to invest in cybersecurity. However, if the approach is reactive and unplanned, then it’s a wasted opportunity. Use this report to structure a sound business case for cybersecurity and privacy investments that will both provide assurance to the stakeholders and value to the business.

  • Building a Wireless and 5G Future

    Sponsored by: Telstra

    Enabling a wireless and 5G future offers exciting opportunities for Australian businesses. For help preparing for and understanding the many benefits 5G can provide, read this white paper. It explores results of a survey conducted in June 2020 with GlobalData, where 150 business and IT decision makers across Australia were interviewed.

  • The Business Executive’s Guide to Cybersecurity

    Sponsored by: Dell SecureWorks

    The days of cybersecurity being a siloed business function is no longer appropriate when considering the financial, reputational and legal implications of today’s cyberthreats. This white paper provides a guide for communication and collaboration between technical and non-technical business leaders – read on to learn more.

  • Future of Digital Infrastructure: Ever Faster Delivery of Reliable Digital Services and Experiences

    Sponsored by: Equinix

    In a time when businesses are rapidly adopting new analytics technologies, AI, IoT, and more, having a flexible, resilient digital infrastructure is a must. Download this report to explore how IT infrastructures are changing to support innovative businesses, and IDC’s expert tips for modernizing your infrastructure.

  • AIOps Analyst Report: A Guide for Investing in Innovation

    Sponsored by: Digitate

    Automated IT operations are the goal of many companies who want to free their employees from responding to menial and repetitive tasks and optimize their workload management. Check out this EMA Radar report that analyzes some of the AIOps tools available on today’s market.

  • Establishing Smart, Simplified, and Secure IT Environments

    Sponsored by: Habour IT

    CIOs that were scrambling towards remote work solutions just months ago now need to turn around and implement cost controls due to pandemic-related revenue shortfalls. Check out this blog post to learn how CIOs are navigating this turbulent time and discover new approaches you can use to cut IT spend.

  • Build a modern IT foundation for maximum business efficiency

    Sponsored by: Red Hat

    IT optimization doesn’t happen all at once. According to Red Hat, this is excellent news—your business can gradually introduce new processes, tools, and strategies to your IT teams while improving productivity and overall business performance. Learn how to start investing in IT optimization here.

  • Alleviate technical debt

    Sponsored by: Red Hat

    Right now, IT organizations spend well over half of their budget on keeping the lights on. In fact, Red Hat found that 71% of IT budgets are used solely for maintaining existing operations—leaving little to no room for innovation. In this report, learn how to alleviate technical debt.

  • Expert Advice to Enable Remote IT Access

    Sponsored by: Vertiv

    In this webinar, Vertiv experts will discuss how to prepare for business continuity when physical access to critical resources is restricted and how to allow access to IT infrastructure from anywhere at any time.

  • Email Security Threats: How to Protect Your Business, People and Data

    Sponsored by: Barracuda

    Every organization is challenged by email security. Rogue actors are increasingly using email to target employees and system administrators with a growing range of threats and techniques – and detection has become more difficult as a result. Stay up to date by viewing this webcast on the latest email security threats and how to defend from them.

  • Remote Work Sustainability Trends

    Sponsored by: Citrix

    Access this e-book to learn the 3-pronged approach to reducing emissions for IT and the 5 benefits that come with it.

  • Webinar: Expert Advice for Integrating a 4G LTE Out-of-Band Network

    Sponsored by: Vertiv

    Disruption is a significant contributor to the deterioration of an organization’s ability to operate at peak efficiency. Therefore, IT organizations need to build a resiliency plan to help mitigate those disruptions. In this webinar, learn how the latest out-of-band technologies can deliver 24/7 access even when your network goes down.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.