e-Mail Content Security Hardware Reports

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

CW@50 - What was making the news in May
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 08 Feb 2021 | Published: 09 May 2016

TechTarget ComputerWeekly.com

How virtual desktops simplify end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 15 Mar 2021 | Published: 19 Feb 2021

TechTarget ComputerWeekly.com

Security Analytics:A popular addition to cyber defence arsenals
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 08 Feb 2021 | Published: 09 Oct 2017

TechTarget ComputerWeekly.com

Computer Weekly – 24 July 2018: Building intelligent aircraft engines with AI and analytics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Rolls-Royce about using AI, sensors and data analytics to build intelligent aircraft engines. Our latest buyer's guide examines the next generation of desktop IT. And we ask whether a court ruling in Chile could lead to a worldwide change in Oracle's software licensing practices. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Jul 2018

TechTarget ComputerWeekly.com

Converged infrastructure in 2021: Next-generation datacentre designs
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Simplifying the deployment and management of datacentre hardware systems is one of the main draws of converged and hyper-converged infrastructure setups for enterprises.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

2019 Network Security Predictions: Top Trends & Challenges
sponsored by TBNG Consulting
EGUIDE: Read this expert guide to review predicted networking trends for 2019. Also, learn why network security remains a top challenge and how you can properly manage it.
Posted: 23 Jan 2019 | Published: 18 Jan 2019

TBNG Consulting

From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts
sponsored by HP Inc
EGUIDE: In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
Posted: 14 Nov 2016 | Published: 02 Nov 2016

HP Inc

CW EMEA – August 2023: Helsinki's Aalto University: Where ideas take off
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW EMEA, we look at the startup scene in Finland. Every startup needs a starting place, and many Finnish innovators began at Aalto University. We also look at how the Gulf region is seeing some of the heaviest investments in the latest technology as countries diversify their economies to reduce reliance on oil. Read the issue now.
Posted: 07 Aug 2023 | Published: 10 Aug 2023

TechTarget ComputerWeekly.com

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure