ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • State of Application Security 2024

    Sponsored by: Cloudflare

    Today’s security practitioners and team leaders are responsible for protecting sensitive customer data and staying vigilant against a wide range of web app attacks and API abuse. Download the State of Application Security in 2024 to discover strategies for securing your web apps and APIs.

  • Modernize InfoSec: A Rosetta Stone for Translating Compliance

    Sponsored by: OneTrust

    90% of respondents to a recent survey indicated that fragmented systems and siloed tools hold back GRC reporting. Tune into this webcast now to learn how you can modernize your InfoSec program and make more risk-informed decisions, including a look at 5 key areas primed for better automation.

  • Utimaco Explainer Movie

    Sponsored by: Utimaco

    This brief explainer video breaks down Utimaco’s approach to security, highlighting the strategy and philosophy behind their approach, and how they help secure organizations with on-premises and as-a-service solutions. Watch the full explainer now to learn more.

  • Groundhog Day, But With Compromised Credentials

    Sponsored by: Cisco

    According to a recent study, 74% of cybersecurity breaches involve the “human element”. This Cisco webcast explores the problems of today’s identity security, invoking the “Groundhog Day” feeling that many security professionals experience as they witness the same challenges day after day. Watch now to learn more.

  • How to uplevel your product discovery practice

    Sponsored by: Atlassian

    In this webinar, Head of Product for Jira Product Discovery, Tanguy Crusson, will share the practices his team instilled to build Jira Product Discovery. View your on-demand recording to access a “meta” example of how to uplevel your product discovery practice.

  • How to Measure the ROI of Your Risk Management Program

    Sponsored by: OneTrust

    In this webcast, you’ll gain insights from a panel of industry experts as they share quick tips and best practices for measuring the ROI of your risk management program. Tune in now to find out how you can make the most of your strategic investments and better protect your organization from risk.

  • Toyota Motor Europe Identity in the Driver's Seat

    Sponsored by: SailPoint Technologies

    Modern organizations can easily find themselves bogged down by endless IT tickets, and abundant data confusion. Enter identity management. In this webcast, Toyota Motor Europe SailPoint Program Manager, Thomas Rollo, describes Toyota’s identity management journey. Watch to learn more.

  • Scaling smart: Leveraging AWS for cost-effective growth

    Sponsored by: AWS

    The data of a startup offers immense value. Read the new ebook, "Scaling Smart: Leveraging AWS for cost-effective growth" to learn how you can create a cost-effective data strategy on AWS that delivers quantifiable value and supports business growth and innovation.

  • Harnessing data to innovate and scale

    Sponsored by: AWS

    In today's data-driven world, startups that embrace a comprehensive data strategy gain a significant competitive advantage. Discover how leading startups are leveraging the power of data on AWS to accelerate innovation, foster efficiency, and make smarter decisions faster.

  • 5 key tips for successful ERP implementation

    Sponsored by: Be-Terna

    Despite the push for organizations to implement ERP systems, many are unsure of how to start. So, what should you know before beginning this process? Tune into this short video to learn more.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.