Virus Detection Hardware Reports

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

CW@50: What was making the news in June
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016

TechTarget ComputerWeekly.com

LogRhythm's Security Analytics Platform: Product Overview
sponsored by LogRhythm, Inc.
EGUIDE: In this expert e-guide, uncover an artificial intelligence engine that takes security to a completely different level than ever before. Uncover how to leverage big data technologies to help mitigate the risk of targeted, persistent threats.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

Can a SASE architecture deliver better network performance?
sponsored by TechTarget Networking
EGUIDE: Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

TechTarget Networking

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Designing the Ideal Digital Work Experience for the Next Generation of Innovators
sponsored by Dell Technologies and Intel
ESG: User expectations for their digital work experience can vary by demographic, location, role and much more. But understanding these expectations is critical to the whole organization's long-term viability. Download this ESG report to explore the results of a comprehensive survey so you can design the ideal digital work experience.
Posted: 10 May 2023 | Published: 10 May 2023

TOPICS:  Hardware
Dell Technologies and Intel

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

TechTarget ComputerWeekly.com

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell