You've requested...

Download this next:

Guide des risques et protections d'identité IT pour RSSI

Ce livre blanc SentinelOne fournit une liste de contrôle pour évaluer les risques liés à l'identité et aux droits d'accès dans les environnements informatiques.

Il aborde la visibilité de la surface d’attaque, la détection des menaces et l’analyse des vulnérabilités. Le livre blanc explique comment gagner en visibilité sur les risques d'attaques d'identité et de privilèges, et comment détecter ces menaces.

Il fournit également des recommandations pour remédier et atténuer les risques grâce à l’automatisation.

Lisez le livre blanc pour en savoir plus sur la sécurisation de vos identités et de vos accès.

These are also closely related to: "Le haut débit peut-il changer le WAN ?"

  • CIO Trends #2

    This guide offers a collection of our most popular articles for IT leaders during the second quarter of 2016, examining the effects of the UK’s Brexit vote for CIOs and debating Gartner’s controversial “bimodal” IT strategy advice. Wikinomics author Don Tapscott writes for Computer Weekly about the emerging blockchain technology and what it means for CIOs. And we talk to Harriet Green, the UK executive in charge of IBM’s global internet of things business. With technology playing a critical role in every business and government body, the role of the IT leaders has never been under more scrutiny – read through the selection of articles here to find out how your peers are tackling the opportunities and delivering the benefits of digital technology. 

  • Mobile Device Security Overview

    In years past, ensuring security for enterprise mobility was simple: Deploy enterprise-grade mobile devices and management platforms to the specific users who require them. However, Bring Your Own Device (BYOD) policies have opened a floodgate of consumer devices into the enterprise. This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.

Find more content like what you just read:

  • E-Guide: Steps to securing your file transfers and meeting compliance requirements

    Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.

    Download

  • Telephony migration: Top considerations for CX success

    When planning your migration to a new CX platform, you expect to be able to deliver better customer journeys through your new solutions and services. However, major migrations can be daunting and can increase risk throughout your organization. Browse this white paper to learn the top approaches for success.

    Download

  • ¡Su Opinión es Crucial para el Estudio de Compra de TechTarget 2023!

    TechTarget, en colaboración con Enterprise Strategy Group, le invita a participar en nuestro Estudio de Procesos de Compra 2023. Estamos dedicados a entender los cambios en su equipo de tecnología y su proceso de investigación en los últimos dos años.

    Download

  • Data security: Don't make these 5 common mistakes

    Take a look through this IBM Security e-book to learn how to avoid five common data security missteps.

    Download

  • CW Europe - December 2020-February 2021: Tour de France fans get a virtual experience

    The organisers of this year's Tour de France worked with technology services company NTT in partnership with Amaury Sport Organisation to provide what they described as an "enhanced experience" for race fans who could not be at the roadside because of Covid restrictions.

    Download

  • Master Data Management Solutions Buyer's Guide

    This guide is aimed at helping you select a Master Data Management (MDM) solution that is best for the scope, context, and identified requirements you need. Read on to learn how you can avoid the trap of only relying on generic analyst ranking reports that consider a lot of capabilities but may not be relevant to your bottom line.

    Download

  • 5 CEM tips from Walter White

    Access this expert e-guide to learn more about customer experience management through the experiences of fictional character Walter White from the popular television series "Breaking Bad." Read on to learn how Kimberly Samuelson of Laserfiche, draws parallels between marketing strategies and the illegal drug business.

    Download

  • Securing your data and digital identities

    With digital adoption at an all-time high, more data and digital identities are being created than ever before. If not secured, these present a serious risk to the future of your business. Download this product overview to learn how Utimaco’s products can help better secure your organization against growing threats.

    Download

  • Securing identities in today’s digital business

    As organizations continue to evolve digitally, the volume of sensitive keys, identities, and data is increasing. Utimaco SecurityServer bundles 30 years of experience in cryptography and Hardware Security Module (HSM) technology into a unique offering that constitutes the root of trust for security and compliance. Read on to learn more.

    Download

  • Engaging Customers: New Lessons around Customer Behavior

    This expert e-guide counts down five customer experience management (CEM) practices that drive success. Also inside, learn how one organization executed an effective mobile CEM strategy. Read on to learn more.

    Download

  • CW Middle East - January-March 2021: $60m venture capital fund targets 120 startups

    Countries in the Middle East see technology as an industry of the future and are investing heavily in the sector as part of their economic diversification plans. Read in this issue how the latest development will see a $60m venture capital fund, based in Bahrain, invest in 120 early-stage startups across the Middle East region.

    Download

  • Computer Weekly - 5 November 2019: The benefits of API-first software development

    In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • Explore low-code's potential to revolutionize your business

    Low-code development promises faster, more affordable app creation, but challenges remain. Explore the latest research, trends, and success stories in this white paper.

    Download

  • IT in Europe E-Zine – The Cloud Issue

    There is enormous competitive advantage to be gained by organisations that understand how to take advantage of the opportunities for innovation that the cloud represents. In this month's IT in Europe, we aim to help point you in the right direction.

    Download

  • Real-time analytics possible fuel for post Covid pandemic growth

    Real-time analytics promises the last word in business agility. There is obvious business value in being able to react immediately to changing patterns in customer behaviour or to prevent problems ahead of time, to give but two examples. And becoming more real-time could be an element in accelerating economic growth beyond the pandemic.

    Download

  • Wi-Fi 5, 6, & 7: Insights & Impacts on Cable Infrastructure

    Because so many people and business rely on wireless devices, wireless access points have seen massive growth in the enterprise space to accommodate. While WAPs continue to improve, wi-fi standards continue to evolve. This is especially true with Wi-Fi 6 which may become the fastest growing standard in history. Read on to learn more about it.

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • CW Europe – March 2018

    Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.

    Download

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

    Download

  • Digital Transformation: Part I

    In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.

    Download

  • 9 Strategies Reshaping the Future of 3PL Warehousing

    Wherever you are on your modernization journey, the right technology and automation plan — and the right implementation partner — can help you become a vital part of your clients’ success. Discover helpful strategies for increasing productivity, improving operational visibility, and exceeding customer expectations in this new eBook.

    Download

  • Tablets & Smartphones in the Enterprise

    Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend.

    Download

  • Tablets and Smartphones in the Enterprise

    This expert ebook takes an in-depth look at the BYOD trend, its impact on business and IT, and what your organization can do to ensure its success in your environment.

    Download

  • CW Benelux February 2018

    In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.

    Download

  • Compare 3 Leading SASE Solutions

    SASE solutions aim to simplify system management by allowing IT administrators to easy manage all the necessary security measures and access permissions from a single cloud-based management architecture. Tap into this comparative report of SASE offerings by Palo Alto Networks, Cisco and Zscaler broken down by 8 sub-tests.

    Download

  • SASE put to the test: Top tools and vendors, compared

    To find out how three SASE products – Cisco Umbrella, Palo Alto Networks Prisma Access Enterprise and Zscaler Internet Access – stack up against each other, read this 20-page report by AV Comparatives.

    Download

  • World Economic Forum Global Risks Report 2018

    The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.

    Download

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

    Download

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • CW Europe – September-November 2017

    In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • Royal Holloway: An enhanced approach for USB security management

    USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.

    Download

  • Mobile Device Management Technical Guide

    In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.

    Download

  • CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business

    Computer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.

    Download

  • Why is there an ethical debate around AI?

    This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.

    Download

  • An expert-driven and data-backed solution to drive implant cost savings

    The surgical implant market itself reached $90 billion in 2020 and has been increasing by 6.5% annually. This e-book is designed to help those in need of surgical implants navigate the market to find an affordable means of meeting their needs, providing an expert-driven and data-backed solution to drive implant cost savings. Read on to learn more.

    Download

  • Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium

    In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.

    Download

  • CW Europe - September-November 2022: Why Russia could become the world's biggest market for illegal IT

    Faced with international sanctions and the departure of many global IT suppliers from Russia, companies there are seeking alternative, and sometimes illegal, routes to access IT products. Also read how new requirements are driving scientists and engineers in Europe back to the lab to start developing 6G technology.

    Download

  • CW Nordics February 2019

    In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.

    Download

  • Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing

    In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.

    Download

  • Computer Weekly – 22 May 2018: GDPR is here – are you ready?

    In this week's Computer Weekly, the EU's new GDPR rules come into force this week – we ask if companies are ready and look at what happens if you're not compliant. Our latest buyer's guide examines digital transformation and the role of the CIO. And we find out how technology is changing the traditional sport of cricket. Read the issue now.

    Download

  • Analysis of the Linux Audit System

    This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.

    Download

  • Guide to leveraging intelligent devices for employee success

    Access this e-book for a look into why utilizing modern, intelligent devices in the workplace are boosting worker performance in collaborative enterprises, and to discover trends and solutions for your company to leverage for success.

    Download

  • CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists

    The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.

    Download

  • Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know

    In this week's Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.

    Download