You've requested...

Download this next:

Enterprise mobility management software offerings and use cases

Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

These are also closely related to: "BlackBerry Widget SDK Beta"

  • The difficulties of defending against web tracking

    This article looks at some of the difficulties that arise while trying to defend ourselves against being tracked as we go about our daily lives on the internet.

    This article introduces you to web tracking, provides an overview of how organisations track users and finally to discusses a few of the difficulties you may face when trying to defend against it.

    We examine web tracking and the types of organisations performing it.

    We also touch on the downsides of being tracked, some of which can make for uneasy reading.

    We also discuss two of the main techniques used for carrying out web tracking.

    We also look briefly at common defences, before moving on to the difficulties involved in trying to defend against being tracked whilst online.

  • Top vendors in endpoint security heading into 2024

    As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose.

    Forrester has identified “must haves,” or characteristics many leaders should look for in EPP and EDR solutions. They recommend customers look for providers that:

    • Prioritize prevention
    • Provide a seamless transition to EDR or XDR
    • Extend the ability to do more with less

    Based on these priorities, amongst other critical factors, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.

Find more content like what you just read:

  • Mobile Payments Using Host Card Emulation with NFC

    In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

    Download

  • Monitoring: Cut time between alert & analysis with automation

    How can your MSP leverage IT automation solutions like LogicMonitor to both improve internal operations and service delivery to your customers? Find out by downloading this white paper, which covers six ways MSPs can automate with LogicMonitor.

    Download

  • CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company

    It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.

    Download

  • Your guide to the leaders of the 2023 MITRE Engenuity ATT&CK Evaluations

    In this e-book, take a comparative look at how endpoint security solutions performed in the most recent ATT&CK evaluation, and find out how Palo Alto Networks are stepping up to the challenge.

    Download

  • Guide to MITRE ATT&CK & endpoint security

    Discover how Palo Alto Networks' Cortex XDR performed in MITRE's 2023 cyberattack simulations versus Turla. Achieving 100% visibility, it blocked all techniques, ensuring top-quality detections. Delve into the results and uncover Cortex XDR's effectiveness in this report.

    Download

  • Guide to MITRE ATT&CK & endpoint security

    Discover how Palo Alto Networks' Cortex XDR performed in MITRE's 2023 cyberattack simulations versus Turla. Achieving 100% visibility, it blocked all techniques, ensuring top-quality detections. Delve into the results and uncover Cortex XDR's effectiveness in this report.

    Download

  • HR leader’s guide to digital transformation

    In the age of digital transformation, HR teams now have more technology and tools at their disposal than ever before. The question is, how do you implement these tools to achieve the best results? Download this eBook to unlock key strategies you can use to take advantage of digital transformation in HR.

    Download

  • How to start prioritizing monitoring in your team

    The cloud can give companies a false sense of confidence—leading to monitoring and on-call initiatives being deprioritized. Use this guide to learn how to build data-driven awareness of your environment, develop good on-call and escalation capabilities, and ensure faster reaction times.

    Download

  • How to tackle information overload

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

    Download

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

    Download

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

    Download

  • Focus: Artificial intelligence in the enterprise

    This special report gives IT leaders a guide to the latest thinking in AI and machine learning, and looks at how these technologies could help in areas such as security, mobile, customer engagement - and even within the IT department itself.

    Download

  • CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment

    Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.

    Download

  • Managing Android devices in the enterprise

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

    Download

  • The key to measuring the value of content

    When 6 out of 10 marketers report that they find measuring content marketing performance either extremely or moderately difficult, it’s clear that organizations need to supply their teams with tools that allow for simpler content quality measurement. But how can this be done? Access this guide to learn more.

    Download

  • Extending passwordless security to customers

    Passwordless security is seen as a secure means of attaining to enterprise identity management. PingOne for Customers Passwordless is designed to solve the challenges of delivering passwordless experiences to customers by combining a cross-section of technologies. Read on to learn more.

    Download

  • A Security Assessment of Android Full-disk Encryption

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

    Download

  • Rugged handheld computers purpose-built for healthcare

    Healthcare workers need to be employed with devices that are not only reliable but feature-packed, time-conservative and mobile. So, what can you expect when you purchase consumer smartphones — instead of rugged handheld computers purpose-built for healthcare? Download this infographic to find out.

    Download

  • Recruitment 101: How to modernize your hiring processes

    Today’s work landscape is evolving at a rapid pace, and many conventional hiring practices aren’t as effective as they once were. So, how can companies best combat major pitfalls and evolve for better recruitment? Browse this eBook to learn more.

    Download

  • Focus: Desktop virtualisation and mobility

    In this guide, we take a close look at how a number of CIO from a wide range of industries have sought to address the demand for mobile working within their organisations, and the technologies they have deployed to ensure data security and access is maintained at all times.

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • Guide to CMS security best practices & protocols

    Today, a company’s content management system (CMS) has become highly vulnerable to cyberattacks. However, understanding the keys to proper CMS security can be difficult, making the efforts to do seem daunting. Browse this guide to learn more.

    Download

  • Everything to know about CMS platforms & more

    In today’s modern era, it’s critical to have the ability to locate information and content efficiently, despite the number of channels you may have active.Content management systems (CMS) have been able to remedy these issues. Access this guide to discover everything you need to know about CMS platforms.

    Download

  • CIO Trends #7

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.

    Download

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • Mobile application platforms: Essential guide

    One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.

    Download

  • A guide to platform agnostic application delivery

    There is no single answer to the question of how to run applications independent of the underlying hardware. In this e-guide, we explore options for application virtualisation.

    Download

  • New tech on the block: Planning for blockchain in the retail and consumer packaged goods industries

    This research from Deloitte identifies the areas with the biggest immediate opportunity for retail and consumer packaged goods (CPG) businesses looking to invest in blockchain technology.

    Download

  • Computer Weekly – 15 August 2023: How does your salary stack up?

    In this week's Computer Weekly, we reveal our annual salary survey, comparing IT professionals' pay and attitudes to their job – how does yours stack up? The new digital chief at DWP discusses AI, data modernisation and shaking up the tech behind the benefits system. Read the issue now.

    Download

  • A Computer Weekly E-Guide to Network Management & Monitoring

    Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.

    Download

  • Computer Weekly - 16 February 2021: How Covid-19 has hit IT salaries and job prospects

    In this week's Computer Weekly, our salary survey reveals the impact of the coronavirus pandemic on IT professionals' wages and job security. A potentially deadly cyber attack on a US water plant highlight the risks to critical infrastructure. And we find out how NHS Scotland is using tech to support its vaccine roll-out. Read the issue now.

    Download

  • Phishing: Your guide to investigation & response

    Read this white paper to understand why your strategy for investigating and responding to a phishing attack must be automated and how Prisma Access Cortex XSOAR from Palo Alto Networks aims to give you the platform on which to automate.

    Download

  • AI/ML-powered Medicare Advantage benefit design

    The competitive Medicare Advantage (MA) market is growing rapidly, and health plans are under pressure to differentiate themselves. One way to do this is by designing a benefits package that meets the evolving needs of MA customers.

    Download

  • Staying on top of your mobile device fleet 24/7

    Mobile devices are now an essential and integral part of the modern workplace enabling employees, contractors, and third-party vendors to access a wide variety of business-critical applications and data. Learn how a 360° mobile device management (MDM) helps you stay on top of your mobile device fleet 24/7.

    Download

  • 2020 Media Consumption Series Infographic Pack

    Here they are, the final results of our 2020 Media Consumption Series all packaged together. We take a dive in to the who, what, why, where, when, and how the IT sector consumes all forms of digital media and more. Answering questions such as why sales reps with data driven intent get the best response rates and what subject lines get the open?

    Download

  • Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?

    In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.

    Download

  • 10 tips for low-code app development

    In this 64-page ultimate guide to low-code application development, discover what questions you should ask before building, 10 development tips, and much more.

    Download

  • Guide to the dangers of third-party threats

    Modern applications are overly reliant on third-party services and content. As a result, security compromises resulting from third-party vulnerabilities have seen a marked increase. Download this white paper to unlock an in-depth look at how you can use an attack surface management (ASM) solution to protect your applications.

    Download

  • Smarter, connected meeting spaces

    This report from analyst group Quocirca explains how to use smart technology to make meetings more effective.

    Download

  • 7 types of networks and their use cases

    A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.

    Download

  • The Managed Detection & Response Landscape

    Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.

    Download

  • CW ASEAN – January 2019: Dive into microservices

    In this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.

    Download

  • Key SDR challenges and how to resolve them

    To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.

    Download

  • Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security

    In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.

    Download

  • Business Analytics: how AI is augmenting analysis, and bolstering data literacy shortfalls

    Artificial Intelligence and human analysis have been coming together in recent years. Whether using packaged BI and data preparation tools, or languages like Python and R, business analysts and data scientists and engineers alike have been exploring the use of machine learning algorithms to augment their data analyses. Read more in this e-guide.

    Download

  • A Computer Weekly buyer's guide to cyber insurance

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

    Download

  • Computer Weekly – 7 May 2024: Casting a critical eye on HMRC's IR35 checker tool

    In this week's Computer Weekly, we investigate what has been going on with the HMRC's Check Employment Status for Tax (CEST). We also speak to the CIO of Danfoss about making datacentres greener and explore the issue of restoring data and system backups after a ransomware or cyber attack. Read the issue now.

    Download