You've requested...

Learn how to protect your company from rising cyberattacks

If a new window did not open, click here to view this asset.

Download this next:

Harness the power of edge computing with Lenovo’s Data Dynamo

Edge computing is the future of efficiency, allowing data processing to occur closer to the source. Lenovo's ThinkEdge portfolio capitalizes on this processing efficiency to provide secure, scalable edge computing solutions.

Their ThinkEdge SE450 server offers tamper-resistant security for sensitive edge locations, while the ThinkEdge SE70 enables enterprise AI and computer vision applications. Zones, a Lenovo partner, provides 24/7 support and supply chain services to deploy Lenovo edge solutions.

To learn more about transforming your business with edge computing, read the product overview.

These are also closely related to: "Learn how to protect your company from rising cyberattacks"

  • CW APAC, November 2021: Expert guide to storage management

    The storage landscape is evolving at pace. In this handbook, focused on storage management in the Asia-Pacific region, Computer Weekly looks at how firms are rising to the storage challenge, Lenovo’s viewpoint on the region’s market opportunities, how the Malaysian Highway Authority made itself more cyber secure and the advantages of Nexustorage’s latest offering

  • MicroScope – November 2019: The growing SD-WAN opportunity

    SD-WAN: How to make some net gains

    How prepared are channel partners to take advantage of the rapidly growing SD-WAN market? Billy MacInnes seeks the advice of some industry experts

    Addressing the tech skills gap in the face of Brexit

    With the UK set to leave the European Union, what are firms doing to fill the resulting empty roles? Cath Everett reports

    Supporting intelligent workspaces

    As new technology continues to drive new ways of working, IT departments need support to facilitate the flexibility and connectivity demanded by today’s tech-savvy workers, says Matthew Beale

Find more content like what you just read:

  • CW APAC: Expert advice on hybrid cloud

    In this handbook on the adoption of hybrid cloud in Asia-Pacific, Computer Weekly looks at what's holding businesses back from making effective use of hybrid cloud.

    Download

  • Computer Weekly - 14 July 2020: Is digital art coming of age during lockdown?

    In this week's Computer Weekly, as the pandemic forces many sectors into a business rethink, digital art is hoping to capitalise on changing times. Chinese supplier Lenovo is dominating the supercomputer market – we examine how it got there. And as datacentre engineers become key workers, we look at the health and safety issues. Read the issue now.

    Download

  • MicroScope January-February 2024: Things are looking up for 2024

    In this issue, catch up on what experts predict for the year ahead in the channel business, as well as a look back on 2023. Also, read about upcoming areas for growth and the importance of understanding cloud reselling to demystify customer needs

    Download

  • Computer Weekly – 30 August 2016: Get protected

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

    Download

  • Executive Interview: Tapping APAC's storage potential

    Lenovo's head of storage in Asia-Pacific singles out the region's market opportunities and predicts that the healthcare sector will go full-fledged with flash storage in the next year.

    Download

  • Hybrid IT: ASEAN firms shift to agile infrastructure

    In this e-guide, read about hybrid IT's growing mindshare in ASEAN, Red Hat's hybrid cloud container push and what you need to consider when buying hyper-converged infrastructure systems.

    Download

  • AI & Automation: Turning data into insights

    In this e-guide, read more about the trends that are shaping the demand for AI and how organizations including healthcare service providers and F1 racing teams are leveraging technology on their own terms.

    Download

  • Artificial Intelligence: Spotlight on ASEAN

    In this e-guide, read about ASEAN's efforts in harnessing AI, the challenges ahead, as well as the rapid developments in the burgeoning field.

    Download

  • Serving up server hardware

    In this e-guide, find out why some companies are still hanging on to older hardware, the pros and cons of different types of server hardware, and what one Chinese tech giant is doing in the microprocessor space.

    Download

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

    Download

  • Has HP taken a calculated risk in splitting the business?

    Hewlett Packard (HP) is planning to turn its consumer computing and printing departments into a separate company. The remaining business would comprise HP's software, business servers and IT services operations.

    Download

  • BadUSB 2.0: Exploring USB man-in-the-middle attacks

    This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.

    Download

  • Technology, media and telecommunications predictions 2017

    Deloitte predicts the key trends in technology, media and telecommunications in 2017

    Download

  • Passwordless security: Securing with insecurity

    According to a recent study, the average person has over 100 passwords. But what if you didn’t need passwords at all? Download this e-book to learn more about adopting passwordless security and see how it could improve your organization’s identity security.

    Download

  • CW APAC – Trend Watch: Datacentres

    Sustainability targets are becoming more pertinent than ever. In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at how firms are approaching the topic, why STT GDC is building its largest datacentre in the Philippines, OVHCloud's India project and the impact of generative AI.

    Download

  • CW ASEAN: Preparing for 5G

    As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.

    Download

  • Ensuring the best meeting room experience

    As offices prepare to re-open, organizations are expanding their investments in collaboration technology to support a hybrid workforce. Download this white paper to discover what it takes to ensure the best experience for your meeting rooms.

    Download

  • CW APAC – October 2020: Trend Watch: Storage

    In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.

    Download

  • IAM: Managing identity remains key to cyber security

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

    Download

  • Identity trends for 2023

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

    Download

  • How edge AI is ideal for state & local government

    By enabling real-time data processing on devices without the need for extensive connectivity or system integration, edge AI facilitates a more streamlined and agile approach to data management. Explore the key benefits of the integration between edge computing and government AI in this eBook.

    Download

  • A Starting Point for Your Zero-trust Journey

    So, you want to launch your journey to zero trust, but you’re wondering where to begin. This IBM paper advises to set identity and access management (IAM) as your starting point. Read on for more guidance.

    Download

  • 6 user authentication types to secure networks

    The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.

    Download

  • Logi Bolt wireless technology at a glance

    Download this e-book to gain access to best practices and recommendations for optimizing the performance of Logi Bolt wireless products in your workplace environment.

    Download

  • Eyes on India: New age of flash storage boosts performance & efficiency

    As one of the forerunners in technology adoption, Indian enterprises have been keen to embrace emerging technologies such as AI, IoT and big data, driving an upsurge in storage requirements. In this e-guide, read more about India's storage market, the next frontier of storage technology and flash storage options from the top cloud providers.

    Download

  • MicroScope – January 2023: Channel themes for 2023

    In this month's ezine, we provide a guide to the main areas of focus for the channel in the year ahead and look at what makes a good partner incentive programme.

    Download

  • Best practices for multi-factor authentication

    Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.

    Download

  • MicroScope - December 2017: Unlock the potential of DaaS

    This month's MicroScope ezine looks at the issues around device as a service (DaaS), the outlook from HP and a report from the UK CompTIA conference.

    Download

  • MicroScope – October 2020: Get in touch with remote network security

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

    Download

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

    Download

  • 2023 IT Priorities APAC Report

    IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.

    Download

  • MicroScope – November 2022: Elevate security to minimise risk

    Security remains a major concern for customers and a continuing area of growth for the channel – so what can managed service providers do to help out? Also read about expectations for the last quarter of 2022 and how partnerships are key to digital transformation.

    Download

  • A Computer Weekly Buyer's Guide to Hyper Converged Infrastructure

    Hyper-convergence has become a buzzword for bringing together hardware and software for multiple tasks. In this 12-page buyer's guide, Computer Weekly looks at tips for buying hyper-convergedsystems, what the technologies can do for your organisation, and how the market is shaping up.

    Download

  • Security leader’s guide to passwordless security

    The average user has to manage passwords for more than 90 online accounts. So, what if you could eliminate passwords altogether? Download this white paper to learn more about passwordless security, and how it presents a solution to the current state of password clutter.

    Download

  • CW APAC October 2023 – Buyer’s guide to IAM

    Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.

    Download

  • Windows vs. Android: Which is better for your meeting needs?

    In order to make communications tools on cloud platforms operate easier, many organizations have meeting room software compatible with third-party hardware running Windows and Android. Because of this, many don’t know which to adopt. Access this guide to learn the pros and cons of both Windows and Android and see which is right for you.

    Download

  • Extending passwordless security to customers

    Passwordless security is seen as a secure means of attaining to enterprise identity management. PingOne for Customers Passwordless is designed to solve the challenges of delivering passwordless experiences to customers by combining a cross-section of technologies. Read on to learn more.

    Download

  • IAM: Key to security and business success in the digital era

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

    Download

  • September ezine: Thinking digital in the world of storage

    The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry

    Download

  • September ezine: Thinking digital in the world of storage

    The full report of the recent MicroScope storage roundtable discussing how cloud and GDPR has changed the industry

    Download

  • November ezine: Peer-to-peer lending

    Credit always matters in the channel and peer-to-peer lending might just be the alternative some have been looking for

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • A Computer Weekly buyer's guide to deep learning

    Deep learning can help companies operate faster and more efficiently. In this 13-page buyer'sguide, Computer Weekly looks at the advanced tools available for developers building intelligentapps, the frameworks that can be used and the kit that can enhance a programmer's toolbox.

    Download

  • Zero Trust Network Access Leadership Guide

    The market for Zero Trust Network Access (ZTNA) solutions has undergone significant growth. Access this Leadership Compass report to see why Akamai was named a Leader in all four categories (Innovation, Product, Market, and Overall) and ensure you choose the right ZTNA for your needs.

    Download

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

    Download

  • A Computer Weekly buyer's guide to Colocation

    Colocation is an increasingly appealing option for data storage. In this 17-page buyer's guide, Computer Weekly looks at the constraints of migration, environmental considerations and datacentre opportunities in Africa.

    Download

  • Best Practices for mobile authentication

    Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.

    Download