ComputerWeekly.com Research Library

Powered by Bitpipe.com

Pretty Good Privacy Research

  • 2017 IT Priorities in the Middle East

    Sponsored by: ComputerWeekly.com

    Benchmark your IT spending plans with our in-depth study of IT spending priorities in the Middle East.

  • 2019 Trustwave Global Security Report

    Sponsored by: Trustwave

    Every year, Trustwave releases a Global Security Report that highlights the common cyberattack trends across the year in order to provide organizations with key insights and real-world data so they can be better prepared. Download this report to read through the 2019 Global Security Report.

  • 3 Strategies to Rapidly Deliver User-Friendly Multi-Channel Apps

    Sponsored by: Mendix

    As competitors continue to release more user-friendly applications on the market, it's becoming harder to maintain customer loyalty. This white paper reveals 3 critical strategies that can help you satisfy users with your applications. Discover how to quickly deploy apps to deliver immediate business impact and ROI.

  • 4 Keys to Automating Threat Detection, Threat Hunting and Response

    Sponsored by: Fidelis

    When it comes to detecting and responding to threats and preventing data loss, speed and accuracy are everything as the machine initially compromised is almost never the one the intruder needs to accomplish his or her objective. In this white paper, explore 4 keys to maturing your advanced threat defense.

  • 4 Ways to Improve Your DevOps Testing

    Sponsored by: xMatters, Inc.

    Explore some of the most common DevOps testing mistakes and learn how to optimize your testing processes. Delve down into topics like why service monitoring and testing matter, and how DevOps is failing 3 key tenets of privacy compliance.

  • A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM

    Sponsored by: SearchSecurity.com

    In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.

  • A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems

    Sponsored by: ShieldX

    Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Thales

    Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.

  • A Computer Weekly Buyer's Guide to Mobile App Development

    Sponsored by: ComputerWeekly.com

    This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.

  • A CW buyer's guide to software asset management

    Sponsored by: ComputerWeekly.com

    Computer Weekly looks at best practice for software asset management in this 10-page buyer's guide.

  • 10 Steps to Email Security

    Sponsored by: Clearswift

    This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.

  • 10 Ways You Can Improve Web App Performance

    Sponsored by: SOASTA, Inc

    This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.

  • 2013 North American Software Defined Data Center Management Platforms New Product Innovation Award

    Sponsored by: HPE and Intel®

    Take a look at this in-depth resource to find out why HP received a "New Product Innovation Award" for their software defined data center management platforms.

  • 3 CIO Essentials: Top Trends To Help Your Business

    Sponsored by: MuleSoft

    This one-stop-shop for CIOs discusses the 3 most important trends companies can capitalize on to help future success. Access this webinar now for an in-depth look into essential topics.

  • 5 Licensing Factors to Consider When Planning a Cloud Migration

    Sponsored by: CDW Corporation

    This expert e-guide from SearchCloudComputing.com offers a primer on cloud licensing. Read on to learn about your options for cloud license management, five licensing factors to consider when planning a cloud migration, and more.

  • 5 Must-have Features in a Marketing Automation Platform

    Sponsored by: Marketo

    There are many marketing automation platforms to choose from, so it is critical that you choose the one that best meets your organization's needs. In this e-guide, uncover which 5 must-have features to look for in a marketing automation platform and find a further outline of their clusters of features.

  • 5 Ways IT Equipment Rentals Can Save Your Neck

    Sponsored by: Canvas Systems

    Find out how renting pre-owned IT equipment can help your business succeed in completing projects.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • 7 Elements of Cybersecurity Readiness

    Sponsored by: Cisco Umbrella and Dimension Data

    Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.

  • 7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction

    Sponsored by: Qualys, Inc.

    Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?

  • 7 Habits of Highly Effective Teams

    Sponsored by: IBM

    Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.

  • 9 Catastrophic Projects, And the Lessons They Teach

    Sponsored by: AtTask

    This white paper considers 9 massive project failures, and analyzes where teams went wrong. Read on to see how mistakes, communication breakdowns, and destroyed budgets can obliterate your projects, and how you can avoid a similar fate.

  • A Closer Look at Windows Vista

    Sponsored by: National Instruments

    One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...

  • A Comprehensive Guide to the Latest Threat Detection Technologies

    Sponsored by: SearchSecurity.com

    This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.

  • A Day in a Low Carbon Life: What Might It Be like to Lead a Business in 2012?

    Sponsored by: IBM

    This entertaining paper describes a day in the life of a fictional Chief Executive Officer, preparing to face market analysts in 2012.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.