Secure Website Reports

IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.
Posted: 08 Feb 2021 | Published: 26 Jun 2017

TechTarget ComputerWeekly.com

Focus ASEAN: Security & Digital Transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

CW Nordics August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.
Posted: 08 Feb 2021 | Published: 24 Aug 2017

TechTarget ComputerWeekly.com

CW Middle East Jan to Mar 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 08 Feb 2021 | Published: 11 Jan 2018

TechTarget ComputerWeekly.com

GFI WebMonitor 2012
sponsored by GFI Software
TRIAL SOFTWARE: Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
Posted: 09 Mar 2012 | Premiered: 09 Mar 2012

GFI Software

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

How to Handle the IoT from the Data Center to Security
sponsored by Xively by LogMeIn
EGUIDE: In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Xively by LogMeIn

The Tangled Web of Data Privacy Issues
sponsored by Thawte Inc.
EGUIDE: In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

Thawte Inc.

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by OpenText Security Solutions
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

OpenText Security Solutions

FireEye 1H 2011 Advanced Threat Report
sponsored by FireEye
ANALYST REPORT: This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

FireEye