You've requested...

Inside the Mind of Executive IT Part 2: How Technology Buyers Research Buys

If a new window did not open, click here to view this asset.

Download this next:

Two-factor vs. multifactor authentication: Which is better?

Which authentication method is better: two-factor or multifactor?

This e-guide explains the differences between these two methods of authentication in order for you to decide which is best for your security environment.

Access now and you’ll also find out whether one is favored for securing credentials in the cloud in particular.

These are also closely related to: "Inside the Mind of Executive IT Part 2: How Technology Buyers Research Buys"

  • Using Intent Data to Align to Today’s Tech Buyer Journey

    To thrive in today’s IT market, you need to understand how IT buyer behavior has changed dramatically.

    Enter TechTarget’s 2022-2023 Media Consumption and Vendor Engagement Study, which analyzes survey results from over 700 technology decision-makers.

    In this webinar, Katie Graybeal, TechTarget’s VP of Market Insights, and Jon Brown, Senior Analyst at Enterprise Strategy Group, break down the findings, which include:

    • Where buyers are conducting research
    • Which messages in ABM outreach are most resonant
    • How leveraging intent data can help businesses engage buyers
    • And more

    Watch now to unlock these insights.

  • The ultimate guide to identity & access management

    Businesses leaders and IT departments are under increased regulatory and organizational pressure to protect access to corporate resources. As a result, they can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets on premises and in the cloud. This e-guide outlines everything you need to know about IAM from the pros and cons to the technologies, tools and vendors.

Find more content like what you just read:

  • MicroScope – September 2019: Helping digital transformation

    The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future

    Download

  • ESG Analyst Jon Brown’s take on modern ITSM: Anatomy & benefits

    According to recent Enterprise Strategy Group (ESG) research, writes Senior ESG Analyst Jon Brown, 98% of organizations using traditional ITSM models report significant challenges. Read this ESG Showcase to consider, instead, the anatomy of modern ITSM and gain guidance on implementation next steps.

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • January ezine: SD-WAN is taking off

    There has been plenty of talk about SD-WAN and the moment has arrived where the technology is making money for the channel

    Download

  • Inside MLC Life Insurance's cloud journey

    When MLC decided to move all its infrastructure, applications and services to the public cloud, its journey was more about people than technology. Learn how MLC overcame these people-related challenges in its move to cloud, improved its security posture and reduced infrastructure spending.

    Download

  • Computer Weekly – 2 August 2016: Giving fashion a digital makeover

    In this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.

    Download

  • SDS vs. traditional storage: What's right for you?

    Learn some tips and tricks to gaining the most value from your SDS program to keep availability high and total cost of ownership low in this expert-eguide.

    Download

  • The rise of the robots: Next generation HR IT

    Within 20 years technology could automate as many as two thirds of middle-ranking job, meaning employers will find it difficult to find the people with the high-level skills they need. This changing demographic has led to a spurt of technological innovation in Human Resources as companies gear up for the recruitment wars that lie ahead.

    Download

  • Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products

    In this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.

    Download

  • Digital experience focus broadens to encompass employees

    This e-guide to employee experience includes a podcast discussion about the evolution of employee experience management. Also, we explore how advanced companies are responding to skills shortages and millennial employee attitudes by listening harder to their workforces.

    Download

  • MicroScope – July 2021: Life on the edge

    With opportunities around edge computing on the up, we ask experts to weigh in on how the channel can approach using the tech to its advantage. Also discover how to encourage employees to take cyber security lessons seriously, and how collaboration is key to growth this year

    Download

  • Harnessing Content to Strengthen Your Go-to-market

    To access insights for enhancing your marketing content strategy, check out this webcast featuring Jon Mycroft, Vice President of Integrated Publisher at TechTarget, and Lynsey Jenkins, Director of Enterprise Security Group Marketing at Akamai Technologies.

    Download

  • ESG analyst insights: Cloud detection & response

    Only 1% of organizations have not experienced a cyberattack on cloud-hosted apps and infrastructure, according to research by TechTarget’s Enterprise Strategy Group (ESG). For more insights about the state of cloud security, and to explore findings about cloud detection and response, watch this webcast.

    Download

  • GenAI & security: 2024 Enterprise Strategy Group report

    What do cybersecurity professionals think about generative AI (GenAI)? To find out, explore this 2024 research report by TechTarget’s Enterprise Strategy Group (ESG).

    Download

  • How is GenAI impacting the 2024 threat landscape?

    How is generative AI impacting the security landscape in 2024? To find out, TechTarget’s Enterprise Strategy Group (ESG) surveyed 370 IT and security professionals. Uncover the findings in this webcast.

    Download

  • Cloud detection & response: Enterprise Strategy Group report

    To understand how organizations are securing their increasingly dynamic cloud environments, TechTarget’s Enterprise Strategy Group (ESG) surveyed 393 IT and security professionals. Unlock the findings in this 32-page report, which unpacks the state of cloud detection and response (CDR) spending and more.

    Download

  • Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players

    In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.

    Download

  • MicroScope January-February 2024: Things are looking up for 2024

    In this issue, catch up on what experts predict for the year ahead in the channel business, as well as a look back on 2023. Also, read about upcoming areas for growth and the importance of understanding cloud reselling to demystify customer needs

    Download

  • Vulnerability management for modern automobiles

    As automobiles become increasingly digital, vulnerabilities found in their software are more dangerous than ever before. In order to better understand the current automobile security landscape, Cybellum conducted this study, utilizing their secuirty team’s experience to draw actionable conclusions. Read on to learn more.

    Download

  • Focus: Securing new technology

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

    Download

  • Top 10 business applications stories of 2019

    The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.

    Download

  • Computer Weekly: Data Danger

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

    Download

  • RPA vs. BPM: How are they different?

    Robotic process automation and business process management are complementary partners in driving digital transformation initiatives. RPA has received a lot more publicity in recent years, but BPM is an essential discipline and a key enabler in scaling RPA projects. Here are the main differences between these process-oriented initiatives.

    Download

  • How sustainability influences IT buying: Analysts’ insights

    To discover how sustainability is impacting IT buying decisions, and to find out how to incorporate messaging about the topic into your business’s content marketing strategy, watch this webcast featuring experts from TechTarget’s Enterprise Strategy Group (ESG).

    Download

  • Sale’s leader’s guide to lead development

    Revenue development was conceived as a way to leverage one-to-many capabilities into more productive opportunity discovery. To learn from a leader who’s broken through, join TechTarget CMO John Steinert as he speaks with Michael Brown, head of Reltio’s Global Revenue Development organization.

    Download

  • Computer Weekly - 10 August 2021: Real-time data analytics in action

    In this week's Computer Weekly, we examine the emerging applications of real-time analytics and highlight the challenges for businesses to maximise the benefits. EU experts are calling for reform of US surveillance laws – we look at the issues. And we talk to the co-CEO of HR software giant Workday. Read the issue now.

    Download

  • Computer Weekly – 21 January 2020: How to avoid becoming the next Travelex

    In this week's Computer Weekly, we look at the lessons learned from the ransomware attack on Travelex and how other firms can avoid the same fate. As Microsoft ends support for Windows 7, we examine the issues for the many remaining users of the operating system. And healthcare CIOs explain the tech challenges facing the NHS. Read the issue now.

    Download

  • The state of medical device security

    Modern medical devices are evolving rapidly. But with the adoption of increasingly software-driven approaches, staying ahead of cyberthreats has become even more challenging. This report presents the findings of a survey conducted with the aid of 150 full-time employees from the medical device manufacturing industry. Read on to learn more.

    Download

  • Keep the (IT) faith: Data, storage, and the GDPR countdown

    An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.

    Download

  • Enterprise Strategy Group Showcase: Attack surface management

    Organizations in the middle of digital transformation initiatives face many security challenges due to their growing attack surfaces. This ESG showcase looks at attack surface management (ASM) solutions, specifically focusing on how IONIX ASM can help organizations monitor, control, and secure their attack surface. Read on to learn more.

    Download

  • Computer Weekly – 6 November 2018: After 10 years, Post Office IT system goes on trial

    In this week's Computer Weekly, 10 years after we revealed concerns over the Post Office accounting system, affected subpostmasters finally get their day in court. We look at how businesses are turning to wearable tech to help employees. And we analyse the key players in the market for object storage. Read the issue now.

    Download

  • Leader’s guide to FDA pre-market cybersecurity requirements

    To deepen your understanding of the FDA’s pre-market cybersecurity requirements for medical devices, take a look through this 23-page e-book.

    Download

  • Manchester United praised for swift response to cyber attack

    The Theatre of Dreams briefly turned into The Theatre of Nightmares last week as Manchester United Football Club suffered a cyber-attack on their systems. This e-Guide dives into more depth about how the attack happened and what Manchester United's cyber security team did, in order to prevent a loss of data and keep a clean sheet.

    Download

  • CW APAC - February 2022: Trend Watch - enterprise 5G

    In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.

    Download

  • The state of industrial devices: Key findings

    Industrial infrastructure is foundational to modern business, making the scope of damage caused by a potential cyberattack nearly impossible to estimate. In order to better understand the state of security across industrial environments, Cybellum conducted a survey with the help of 200 industrial professionals. Download to learn more.

    Download

  • Computer Weekly - 12 October 2021: How AI - and puffins - are boosting renewable energy

    In this week's Computer Weekly, we find out how an artificial intelligence system for tracking puffins could help boost renewable energy use. We examine the often-overlooked, but often damaging, diversity issue of age discrimination in tech. And we look at the key considerations when choosing enterprise cloud file services. Read the issue now.

    Download

  • July ezine: Getting storage right

    An issue looking at what products are in demand now in the storage world and what technologies are coming that need to be embraced by the channel.

    Download

  • Computer Weekly – 11 June 2019: Are schools delivering on digital skills?

    In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to Business Intelligence and Analytics

    Business intelligence and analytics is an ever-changing landscape. In this 20-page buyer's guide, Computer Weekly looks at firms' search for data scientists, how modern business intelligence works for big data and the role DevOps can play in navigating a data onslaught.

    Download

  • MicroScope – June 2019: Sourcing IT among the clouds

    Outsourcing is changing as the anything-as-a-service model takes off.

    Download

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

    Download

  • CW Europe – December 2017

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

    Download

  • The long march of S/4 Hana

    S/4 Hana, the ERP system built on SAP's in-memory, columnar database Hana has been on a long march through the enterprise since its launch in February 2013. In this e-guide, we discuss the pros and cons of upgrading to S/4 Hana, what the future has in store for the system and how its users are feeling about C/4 Hana integration.

    Download

  • 10 top artificial intelligence certifications

    Artificial intelligence (AI) is on track to be the key technology enabling business transformation and allowing companies to be more competitive. Learning about and understanding AI can set individuals on the path to promising careers. In this infographic, we share 10 top certifications and courses to help you succeed in a future powered by AI.

    Download

  • CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company

    It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.

    Download

  • Top IT Predictions in APAC in 2023

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

    Download

  • CW Nordics - May-July 2019: Facing up to fintech

    In this issue of CW Nordics, we take a look at how one of the Nordic region's big, traditional banks is going about meeting the challenges posed by new digital entrants into the finance sector. And it is another large traditional player, but this time in the IT world, which Nordea is turning to for support– none other than Big Blue.

    Download