You've requested...

Share this with your colleagues:

Windows 10—Considerations for Adoption

If a new window did not open, click here to view this asset.

Download this next:

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

Computer Weekly – 19 June 2012: How to succeed at desktop virtualisation 

In this week’s Computer Weekly, our latest Buyer's Guide examines the tools, technologies and best practices for success in desktop virtualisation. We ask if a six-year-old hardware technology – Trusted Platform Module - could be a key to tackling IT security threats. We look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Deloitte's CIO talks about how the global advisory firm is introducing a bring your own device (BYOD) scheme. And we look at new environmental guidelines that will help companies understand the carbon footprint of their IT. Read the issue now.

 

Buyer's Guide to desktop virtualisation – part one: How to exploit thin-client computing

Thin-client computing – or more accurately, server-based computing – has been around for years. We look at how the technology can help cut costs and improve flexible working while maintaining security, as part of a desktop virtualisation strategy. 

 

Could 2012 be the year TPM security technology reaches critical mass?

Since 2006, many new computing devices have been sold with a built-in trusted platform module (TPM) chip, but enterprises have yet to embrace the technology in their information security strategies.

 

Fujitsu UK CEO steers private sector course in bid to cut public exposure

Duncan Tait took the helm at Fujitsu at the height of the credit crunch and all the upheaval it triggered, but revenues and orders are on the rise again.

 

Case study: Greenwich University centralises IT development onto single platform

A web portal implemented by Greenwich University has enabled it to centralise administrative processes and teaching resources, allowing staff and students to access services with a single log-in.

 

Dealing with the practicalities of the consumerisation scheme at Deloitte

Deloitte CIO Matt Peers is embracing the benefits of a bring your own device project but says there are limits to what you can do. 

 

Opinion: Bed down for Byte Night

The annual IT industry charity sleep-out to raise funds to help homeless children takes place this year on 5 October. Byte Night founder Ken Deeks writes about how you can help. 

 

The CIO role through the lens of MIT: Agile rebel or company dishwasher?

A conference at the Massachusetts Institute of Technology highlighted the changing role of the CIO.

 

Cutting emissions in the big picture

New guidelines on carbon footprinting in IT were published earlier this year which, if widely adopted, could lay bare the extent of emissions beyond the boundaries of a company’s own premises.

 

This week's digital edition is sponsored by BCS Institute, Computer Aid, Intel, RES Software, Skillsoft and Terrapin.

These are also closely related to: "Windows 10—Considerations for Adoption"

  • How to prepare for your next security breach

    Don’t lose unnecessary time coping with attacks, threats and theft.

    Lenovo ThinkShield is a comprehensive security portfolio that can bring you end-to-end protection.

    In this solutions guide, find out:

    • The benefits of ThinkShield
    • How to ensure your data stays secure
    • How to keep employees stay safe online
    • Important statistics on the rise of cyberattacks

  • E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses

    Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. Microsoft promised a breadth of new security features with this release, but are they all as good as they sound? This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.

Find more content like what you just read:

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • Explore the role of PKI in ensuring privacy, integrity and security

    Download this white paper to learn how PKI can help you reduce risks of outage or breach, speed time of delivery, keep security standard high, future-proof your cryptography, maintain interoperability, free your valuable technical resources, and last but not least, save money.

    Download

  • How to use VDI security to block cyberattacks

    In this 12-page buyer's guide, Computer Weekly looks at Microsoft's latest Windows release, the state of play in the battlebetween Linux and Unix, and the future of the server operating system.

    Download

  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.

    Download

  • Reasons to deploy Hitachi ID Password Manager

    Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.

    Download

  • Securing access to premises, applications and networks

    Organizations that want to secure access to their premises, applications and networks run into significant challenges. Unfortunately, the technology to address those issues can sometimes require products from up to 12 different vendors. Download this product overview to learn about HID PIV and how it can address all those challenges.

    Download

  • Results of NVMe-based HCI tested on mixed-app workloads

    This ESG Lab resource reviews Pivot3 Acuity HCI, which features NVMe PCIe flash and policy-based quality of service to maintain predictable high performance for mixed-application workloads. Read on to see the results of this HCI solution tested on the likes of VDI and database workloads.

    Download

  • How to prevent identity-related data breaches with strong authentication

    As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.

    Download

  • Documenting fraud detection with machine learning

    An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.

    Download

  • The dark web: What type of tools are popular among cybercriminals

    This Black Market Report reveals a snapshot of the type of activity threat actors are participating in every day, as well as valuable insights into what type of tools and services are popular among criminals.

    Download

  • How machine learning can help organizations catch identity fraud

    An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.

    Download

  • Migration to cloud backup spares data from destruction: But how?

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

    Download

  • How to choose your authenticator

    Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.

    Download

  • How to establish end-point security

    The aim of this paper is to demonstrate how endpoint security status can be used to enable access within a Collaboration Oriented Architecture.

    Download

  • Heads up CIOs: Hidden threats lurking in your company

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • Top IT priorities making leaders' shortlists in 2017: Find out now

    In this issue of Computer Weekly, discover how CIOs are spending their 2017 budgets – and what IT priorities top their shortlists. Read on to additionally investigate what Brexit means for data protection, and find out how HSBC's mobile strategy has evolved using agile methodologies and cloud computing.

    Download

  • Windows Server 2008's final days are ahead: Here's how to plan

    As Windows Server 2008 R2's January end of support date looms in the near-distance, not all organizations have their upgrade strategies mapped out. Inside this white paper, learn how to better prepare for operating system upgrades, including how to plan a Windows Server 2019 migration to Microsoft Azure.

    Download

  • Keep you CMDB healthy and reliable with these tips

    Inside this CMDB playbook, learn how to set up your ServiceNow Discovery environment in a way that keeps your current configuration management list up-to-date and reliable.

    Download

  • Intrusions from 2018 – Threat hunting techniques to watch out for

    This report provides a summary of OverWatch's findings from intrusion hunting during the first half of 2018. It reviews intrusion trends during that time frame, provides insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified. Read on to learn more.

    Download

  • Exploring attacks against the financial services industry

    There's no one organization that can detect and track all aspects of the attacks we face today. But combining intelligence from different types of attack data with broad experience allows talented analysts to understand the attacks they do see. In this research report, explore attacks against the financial services industry.

    Download

  • How organizations can verify the true identity of digital users

    Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.

    Download

  • Is a shift from UEM to unified workspace management necessary?

    Download this white paper to learn about a workspace management platform that provides a single point of control across every part of your digital workspace – going beyond just endpoints to apps, content, identities, networks and more.

    Download

  • Ransomware protection: The first line of defense is...

    This white paper introduces you to a security-rich data protection solution that addresses the growing threat that ransomware attacks pose: Acronis Backup. In order to prevent serious downtime and data corruption in your organization, check out this resource.

    Download

  • Overcoming BC/DR challenges for virtual environments

    This paper highlights a DR solution that can seamlessly recover protected VMs and physical servers: OffsiteDR Server. Read on for a rigorous assessment of this DR solution's performance and functionality.

    Download

  • Raspberry PI with Java: programming the internet of things

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

    Download

  • Key capabilities of Mimecast Web Security

    Mimecast Web Security is integrated with Mimecast's Secure Email Gateway with Targeted Threat Protection, helping customers consolidate protection using a single, cloud-based service that protects against the two most dominant cyberattack vectors: email and the web. Download this datasheet to learn more about Mimecast's key capabilities.

    Download

  • The battle to secure all endpoints

    Users accessing corporate data, apps, devices, on laptops or off-premise, is at an all-time high and businesses must increase their security. Explore ways your organization can shrink its security gaps and risks with Single-Sign On (SSO).

    Download

  • Detecting the use of TrueCrypt

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.

    Download

  • Optimize RPO and RTO with OffsiteDR

    In this resource learn how OffsiteDR Server, a backup and disaster Recovery (BDR) data protection solution, enhances DRM operations by eliminating all potential single points of failure for restore functions.

    Download

  • Best practices for securing privileged access

    Download this white paper to learn more about the best practices for processes, policies and technology used to secure access to privileged accounts and other elevated privileges.

    Download

  • 4 major cyberattack methods and how to defend against them

    The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.

    Download

  • How to prevent payroll diversion scams and direct deposit theft

    In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.

    Download

  • Windows 2012 Server Network Security

    This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and  IPv6. It includes a 30% discount code for Computer Weekly readers.

    Download

  • Take aim at network security

    In this e-guide, learn more about securing software-defined wide area networks, the top three network security challenges facing CISOs, and why network security remains primary in any truly comprehensive security strategy.

    Download

  • Explore why identity proofing is key to avoiding identity theft

    Technology advancements have changed the landscape of identity proofing, challenging organizations to digitally verify that an individual is who they say they are online. But many businesses are resultant to implement identity proofing. In this white paper, learn why identity proofing is key to avoid risks associated with identity theft.

    Download

  • Tips for evaluating storage needs in a VDI environment

    In this expert briefing, veteran IT industry consultant Chris Evans drills into the specific challenges that storage managers face when implementing virtual desktop infrastructures, and provides practical tips to help guarantee a VDI project that meets expectations and delivers on its projected ROI.

    Download

  • CW500: Best practice in BYOD

    Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.

    Download

  • How to manage privileged accounts

    Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.

    Download

  • A Computer Weekly Buyer's Guide to Internet of Things Security

    In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.

    Download

  • 13 things your next-generation firewall should do

    The rapid evolution of IT has changed the face of the network perimeter. The result is an incredibly complex network that introduces significant business risk. In this white paper, explore the evolution of the firewall to "next-generation" and discover 13 key things a next-generation firewall must do to secure your network and your business.

    Download

  • A Computer Weekly buyer's guide to evergreen IT

    Windows 10 is providing a feast of updates for its users. In this 15-page buyer's guide, Computer Weekly looks at how IT leaders can manage these changes, the implications incremental updates could have on sysadmins, and the role cloud services can play in achieving a smooth transition.

    Download

  • Key benefits of Hitachi ID Privileged Access Manager

    In this product overview, learn about the Hitachi ID Privileged Access Manager and how it can secure access to high risk accounts and groups, replace static, shared passwords with periodically changing random values, and much more.

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • Entitlements and credentials relate to risk: How automation can help

    This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.

    Download

  • How to protect your organization using a variety of authentication methods

    As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.

    Download

  • CW Buyer's Guide: Desktop virtualisation

    This eight-page buyer's guide looks at desktop virtualisation and identifies some of the options IT directors must consider when planning a virtualisation project.

    Download