IEC White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Israel Electric Corporation Moves Toward Smarter Maintenance
sponsored by IBM
CASE STUDY: This use case describes how Israel's largest electricity provider utilizes IBM's predictive analytics software to monitor its turbine performance in real time, enabling the company to discover and resolve anomalies before outages occur.
Posted: 25 Feb 2015 | Published: 30 Sep 2013

IBM

Guide: IAM, Third-Party IoT Risk, Cybersecurity Frameworks and CISO Best Practices
sponsored by Beta Systems
EGUIDE: Read this guide to explore trends in identity and access management (IAM) and third-party IoT risk, best practices for fitting NIST and ISO/IEC JTC 1 frameworks into your security program and the importance of cyber literacy, as well as finding the right security talent, for CISOs.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

TOPICS:  .NET
Beta Systems

Industrial Cybersecurity: Monitoring & Anomaly Detection
sponsored by Cisco
RESOURCE: Industrial control systems (ICS) are all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more.
Posted: 27 Jan 2020 | Published: 27 Jan 2020

Cisco

NIS2 Compliance for Industrial Operations with Cisco
sponsored by Cisco
PRODUCT OVERVIEW: NIS2 compliance is complex for industrial organizations. Cisco helps by securing IACS infrastructure and supply chain with its Cyber Vision visibility tool, ISE network access control, and Secure Equipment Access remote access. Read how Cisco's comprehensive OT security solutions enable NIS2 compliance.
Posted: 03 Apr 2024 | Published: 03 Apr 2024

TOPICS:  .NET
Cisco

Storage Capacity 101 to Post-Grad in a Flash
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

SecurityServer – Secure Your Organization’s Most Valuable Assets
sponsored by Utimaco
PRODUCT OVERVIEW: As organizations continue to evolve digitally, the volume of sensitive keys, identities, and data is increasing. Utimaco SecurityServer bundles 30 years of experience in cryptography and Hardware Security Module (HSM) technology into a unique offering that constitutes the root of trust for security and compliance. Read on to learn more.
Posted: 01 Jun 2023 | Published: 01 Jun 2023

TOPICS:  .NET
Utimaco

SecurityServer – Secure Your Organization’s Most Valuable Assets
sponsored by Utimaco
PRODUCT OVERVIEW: With digital adoption at an all-time high, more data and digital identities are being created than ever before. If not secured, these present a serious risk to the future of your business. Download this product overview to learn how Utimaco’s products can help better secure your organization against growing threats.
Posted: 21 Oct 2023 | Published: 21 Oct 2023

TOPICS:  .NET
Utimaco

Plugging Into Zero Clients Powers Investment Programme
sponsored by Dell
CASE STUDY: Discover how a VDI solution enabled improvement of a desktop environment by centralizing data to tighten security.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

Dell

Mobile NFC in Transport
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

TechTarget ComputerWeekly.com

Cloud Security Frameworks and 10 IAM Tools for Network Security
sponsored by Nexum
EGUIDE: Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.
Posted: 07 Dec 2021 | Published: 01 Dec 2021

TOPICS:  .NET
Nexum

u.trust Anchor – Highest Security Inspired by Cloud Technology
sponsored by Utimaco
PRODUCT OVERVIEW: In the wake of digital transformation, hackers have taken advantage of the expanding attack surface to deliver an unprecedented scale of attacks. Utimaco’s next generation HSM, u.trust Anchor, is designed to deliver a leap forward in security and innovation, bringing together robust encryption and secure key management. Read on to learn more.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET
Utimaco

Start with Entry-level HSMs for Robust Security in Every Application
sponsored by Utimaco
PRODUCT OVERVIEW: Security is often constrained by limited resources, but with entry level hardware security modules (HSMs), tailored to function seamlessly within these limitations, security doesn’t have to come at the expense of efficiency. Unlock Utimaco’s catalogue of offerings and find the HSM that’s right for your organization.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET
Utimaco

Prefabricated and Micro Datacentres: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As debate continues to rage about what role private, enterprise-owned datacentres will play in firms' IT strategies in the years to come, what is becoming clear is that they type of facilities companies rely on are sure to change in line with their evolving business needs.
Posted: 08 Feb 2021 | Published: 26 Sep 2016

TechTarget ComputerWeekly.com

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Enterprise

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

Step-by-step disaster recovery planning guide
sponsored by TechTarget ComputerWeekly.com
EBOOK: IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
Posted: 29 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com

Link Software Development to Measured Business Value Creation
sponsored by JBS Custom Software Solutions
EBOOK: PH
Posted: 04 Jun 2021 | Published: 04 Jun 2021

All resources sponsored by JBS Custom Software Solutions

Virtualization Security: Protecting Virtualized Environments
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

TechTarget ComputerWeekly.com

Security Pay Rates: UK Permanent Salary Index February 2013
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This research from Acumin and Computer Weekly charts the rate for the job for over 60 IT security and compliance roles.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

TechTarget ComputerWeekly.com

How Financial Services Leaders are Ramping Up Innovation While Staying Secure
sponsored by Slack
WHITE PAPER: See how Asia-Pacific financial services leaders are combining operational agility with AI-powered productivity while bolstering security and compliance.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

Zero Trust Security for Zero Operational Downtime
sponsored by Palo Alto Networks
RESEARCH CONTENT: Though they present great opportunity, Industrial Internet of Things (IIoT) initiatives present great security risk as well as financial risk, because of the costly nature of shutting down operations. So, how can you secure your business’s OT environment and mitigate such risks? Tap into this 2023 VDC Research paper for insights.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  .NET
Palo Alto Networks

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

Real-Time Access, Enhanced Services and Low TCO
sponsored by AMD
WHITE PAPER: GIS apps play an important role with the use of location-based data. See how Multiuser GPU technology benefit GIS users.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

TOPICS:  IT Management
AMD

Presentation Transcript: Leveraging Rugged Systems to Meet the Needs of Your Mobile Computing Environment
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Rugged notebooks have improved tremendously over the past few years and more and more companies are using these durable computers to meet their business needs. This presentation transcript discusses the latest trends and features in using rugged systems for your mobile workforce.
Posted: 02 Feb 2010 | Published: 27 Jan 2010

DellEMC and Intel®