You've requested...

Share this with your colleagues:

Windows 10—Considerations for Adoption

If a new window did not open, click here to view this asset.

Download this next:

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

Computer Weekly – 19 June 2012: How to succeed at desktop virtualisation 

In this week’s Computer Weekly, our latest Buyer's Guide examines the tools, technologies and best practices for success in desktop virtualisation. We ask if a six-year-old hardware technology – Trusted Platform Module - could be a key to tackling IT security threats. We look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Deloitte's CIO talks about how the global advisory firm is introducing a bring your own device (BYOD) scheme. And we look at new environmental guidelines that will help companies understand the carbon footprint of their IT. Read the issue now.

 

Buyer's Guide to desktop virtualisation – part one: How to exploit thin-client computing

Thin-client computing – or more accurately, server-based computing – has been around for years. We look at how the technology can help cut costs and improve flexible working while maintaining security, as part of a desktop virtualisation strategy. 

 

Could 2012 be the year TPM security technology reaches critical mass?

Since 2006, many new computing devices have been sold with a built-in trusted platform module (TPM) chip, but enterprises have yet to embrace the technology in their information security strategies.

 

Fujitsu UK CEO steers private sector course in bid to cut public exposure

Duncan Tait took the helm at Fujitsu at the height of the credit crunch and all the upheaval it triggered, but revenues and orders are on the rise again.

 

Case study: Greenwich University centralises IT development onto single platform

A web portal implemented by Greenwich University has enabled it to centralise administrative processes and teaching resources, allowing staff and students to access services with a single log-in.

 

Dealing with the practicalities of the consumerisation scheme at Deloitte

Deloitte CIO Matt Peers is embracing the benefits of a bring your own device project but says there are limits to what you can do. 

 

Opinion: Bed down for Byte Night

The annual IT industry charity sleep-out to raise funds to help homeless children takes place this year on 5 October. Byte Night founder Ken Deeks writes about how you can help. 

 

The CIO role through the lens of MIT: Agile rebel or company dishwasher?

A conference at the Massachusetts Institute of Technology highlighted the changing role of the CIO.

 

Cutting emissions in the big picture

New guidelines on carbon footprinting in IT were published earlier this year which, if widely adopted, could lay bare the extent of emissions beyond the boundaries of a company’s own premises.

 

This week's digital edition is sponsored by BCS Institute, Computer Aid, Intel, RES Software, Skillsoft and Terrapin.

These are also closely related to: "Windows 10—Considerations for Adoption"

  • E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses

    Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. Microsoft promised a breadth of new security features with this release, but are they all as good as they sound? This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.

  • What's new in vSphere 6.7?

    Today’s businesses demands a modern approach to infrastructure — which is why more IT organizations are turning to latest virtualization technologies to attain new levels of speed, agility, and cost savings. Enter vSphere 6.7.

    Jump into this in-depth whitepaper to explore the new features and virtualization benefits that vSphere 6.5 brings to the table, including its lifecycle management functionality, operations dashboard, automation and developer interfaces, and security capabilities.

Find more content like what you just read:

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • Hitachi ID Password Manager: Manage credentials across multiple systems & apps

    Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.

    Download

  • Personal Identity Verification: Benefits and use cases

    Organizations that want to secure access to their premises, applications and networks run into significant challenges. Unfortunately, the technology to address those issues can sometimes require products from up to 12 different vendors. Download this product overview to learn about HID PIV and how it can address all those challenges.

    Download

  • How to use VDI security to block cyberattacks

    In this 12-page buyer's guide, Computer Weekly looks at Microsoft's latest Windows release, the state of play in the battlebetween Linux and Unix, and the future of the server operating system.

    Download

  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.

    Download

  • What's new in Windows Server 2019? Side-by-side version comparison

    Inside, discover what Windows Server 2019 brings to the table – and how to build a hardware strategy that capitalizes on its fresh hybrid cloud focus. Plus, see how this version compares to the previous 2008 R2, 2012 R2, and 2016 offerings.

    Download

  • Password management: A how-to guide

    Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.

    Download

  • 40-page guide to vSphere 6.7 upgrades

    In this 40-page eBook, find out everything you'll need to know when considering an upgrade to vSphere 6.7, including the three phases that comprise the upgrade process: pre-upgrade activities, mapping the upgrade, and upgrade completion.

    Download

  • Encryption for data in use

    Consumers and enterprises are becoming increasingly concerned about the security of their digital data, and with just cause. This sense of heightened concern is particularly relevant given the ongoing migration of end user data into the cloud. Read on to learn about the protection requirements for data in flight, data at rest, and data in use.

    Download

  • How to protect identities by taking a holistic approach to IAM

    As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.

    Download

  • Results of NVMe-based HCI tested on mixed-app workloads

    This ESG Lab resource reviews Pivot3 Acuity HCI, which features NVMe PCIe flash and policy-based quality of service to maintain predictable high performance for mixed-application workloads. Read on to see the results of this HCI solution tested on the likes of VDI and database workloads.

    Download

  • Under the hood of Dell’s OptiPlex 3070 micro series

    Click inside to take a closer look at the latest OptiPlex 3070 desktop series from Dell EMC, including its tower models, micro-PC editions, and recommended accessories and mounting equipment.

    Download

  • How to choose your authenticator

    Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.

    Download

  • Why web browsers serve as the perfect cyberattack vector

    Browsers are integral to an effective working environment but they also serve as the perfect cyberattack vector. Web-based attacks are one of the top methods of system compromise and they are on the rise. In this brief, explore common types of web threats.

    Download

  • How machine learning can help organizations catch identity fraud

    An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.

    Download

  • An analysis of recent server hardware security breaches

    Inside this analyst report from IDC, learn more about the threats that face server, processor, and other infrastructure components within today’s data centers – and find out how to start plugging potential holes in your organization’s own hardware security perimeter.

    Download

  • Computer Weekly: Data Danger

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

    Download

  • How to establish end-point security

    The aim of this paper is to demonstrate how endpoint security status can be used to enable access within a Collaboration Oriented Architecture.

    Download

  • Migration to cloud backup spares data from destruction: But how?

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

    Download

  • A guide to stopping credential theft

    With most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.

    Download

  • Your healthy CMDB playbook

    Inside this CMDB playbook, learn how to set up your ServiceNow Discovery environment in a way that keeps your current configuration management list up-to-date and reliable.

    Download

  • A reliable CMDB is priceless: Here's how to keep it current

    As if thorough infrastructure visibility wasn't hard enough to come by, many organizations are letting their CMDBs collect dust in the corner – inadvertently making infrastructure management and configuration that much tougher. In this best practices guide, learn how to keep your CMDB as current and reliable as possible.

    Download

  • IT Handbook: Network Considerations for VDI

    This expert handbook provides essential insight into network infrastructure preparations for transitioning to a virtual desktop infrastructure. Discover additional information in the areas of network resilience and redundancy, bandwidth considerations, and network services and security.

    Download

  • Detecting the use of TrueCrypt

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.

    Download

  • 8 steps for complete privilege management

    Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.

    Download

  • Why it's time to think beyond UEM and focus on a unified workspace

    Download this white paper to learn about a workspace management platform that provides a single point of control across every part of your digital workspace – going beyond just endpoints to apps, content, identities, networks and more.

    Download

  • Utilizing Microsoft 365 to secure the modern workplace

    Cyberthreats are the top concern among leaders heading up companies of all sizes, and identity and access management (IAM) is a foundation of enterprise cybersecurity. In this white paper, discover how to secure the modern workplace with Microsoft 365.

    Download

  • Managing devices in the new 'work-from-anywhere' culture

    In this white paper, learn how secure digital workspaces can make it easier for IT to manage all apps, desktops, data, and devices across disparate locations – and give employees the unified experience they need to be productive.

    Download

  • OBSERVATIONS FROM THE FRONT LINES OF THREAT HUNTING

    This mid-year report provides a summary of OverWatch’s threat hunting findings from the first half of 2019. Download now to review intrusion trends during that time frame, insights into the current landscape of adversary tactics and delivers highlights of notable intrusions OverWatch identified.

    Download

  • Protecting financial mobile applications

    Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.

    Download

  • Windows Server 2008's final days are ahead: Here's how to plan

    As Windows Server 2008 R2's January end of support date looms in the near-distance, not all organizations have their upgrade strategies mapped out. Inside this white paper, learn how to better prepare for operating system upgrades, including how to plan a Windows Server 2019 migration to Microsoft Azure.

    Download

  • 9 key areas to achieve strong Privilege Access Management

    This buyers' guide is designed to help you choose the right privileged access management solution for your organization. Read on for the 9 major areas needed for your company to achieve strong privileged access management, and compare the features and capabilities to look for when selecting a solution.

    Download

  • Overcoming BC/DR challenges for virtual environments

    This paper highlights a DR solution that can seamlessly recover protected VMs and physical servers: OffsiteDR Server. Read on for a rigorous assessment of this DR solution's performance and functionality.

    Download

  • Save 30% in CapEx by ditching your aging virtualization platform

    Legacy virtualization platforms often result in degrading performance and decreasing productivity. For Questas, migrating to Red Hat Virtualization reduced average log-in time from 2.5 minutes to just 35 seconds, while also reducing CapEx by 30%. Learn more about Questas’ success with Red Hat in the full case study here.

    Download

  • An alternative to traditional, slow IBM i backup tech

    Inside this white paper, learn how FalconStor’s Virtual Tape Library (VTL) offers an alternative for IBM i storage environments, providing a non-disruptive disk-to-disk backup format to accelerate the speed and security of critical recovery and backup processes.

    Download

  • How to secure access to privileged accounts

    In this product overview, learn about the Hitachi ID Privileged Access Manager and how it can secure access to high risk accounts and groups, replace static, shared passwords with periodically changing random values, and much more.

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • Top IT priorities making leaders' shortlists in 2017: Find out now

    In this issue of Computer Weekly, discover how CIOs are spending their 2017 budgets – and what IT priorities top their shortlists. Read on to additionally investigate what Brexit means for data protection, and find out how HSBC's mobile strategy has evolved using agile methodologies and cloud computing.

    Download

  • Enhance DR resilience with OffsiteDR

    In this resource learn how OffsiteDR Server, a backup and disaster Recovery (BDR) data protection solution, enhances DRM operations by eliminating all potential single points of failure for restore functions.

    Download

  • Raspberry PI with Java: programming the internet of things

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

    Download

  • How financial organizations can protect against emerging threats

    The financial services industry is one of the most sought-after targets for attackers. Staying aware of new attack trends is imperative for financial organizations to keep their systems and customers safe. In the 2019 State of the Internet: Security Financial Services Attack Economy Report, learn how to protect against emerging threats.

    Download

  • How to support the intelligent workplace

    Modern mobile workforces expect flexibility and support from their workplace. They want to be able to use their own consumer products to get their jobs done—and this can mean trouble for IT teams. Download this e-guide to learn how IT teams can support these new employee expectations while still keeping company intellectual property secure.

    Download

  • Key capabilities of Mimecast Web Security

    Mimecast Web Security is integrated with Mimecast's Secure Email Gateway with Targeted Threat Protection, helping customers consolidate protection using a single, cloud-based service that protects against the two most dominant cyberattack vectors: email and the web. Download this datasheet to learn more about Mimecast's key capabilities.

    Download

  • Today's laptop security gaps

    Users accessing corporate data, apps, devices, on laptops or off-premise, is at an all-time high and businesses must increase their security. Explore ways your organization can shrink its security gaps and risks with Single-Sign On (SSO).

    Download

  • Going passwordless: Goodbye identity-driven attacks, hello seamless experiences

    Identity-driven attacks are increasingly common methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud. Read this data sheet to discover how passwordless authentication can help keep attackers at bay without locking out good users.

    Download

  • CW500: Best practice in BYOD

    Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.

    Download

  • How to prevent payroll diversion scams and direct deposit theft

    In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.

    Download