You've requested...

Moving Towards Compliance Identity Governance for Files

If a new window did not open, click here to view this asset.

Download this next:

Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know

In this week’s Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.

These are also closely related to: "Moving Towards Compliance Identity Governance for Files"

  • Revenue acceleration for digital leaders

    Companies across the corporate spectrum are striving to implement digital transformation strategies to drive up agility, responsiveness and enhance the customer experience.

    A clear minority of leaders are starting to emerge who are reaping the benefits. In fact, according to the 2018 Harvey Nash/KPMG CIO Survey – the largest IT leadership survey in the world, taking in the views of nearly 4,000 IT leaders across 84 countries – 61% of companies that are effective at using digital technologies see higher revenue growth than their competition.

    But the majority of businesses are finding it more challenging – a reality that came through very clearly in this year’s survey. However, there are a number of clear priorities that organisations can embrace to drive better, quicker and more certain returns. This report from KPMG gives three key action points.

  • 4 ways to avoid gambling with cyber risk disclosure

    Investors have been feeling chest pains over cyber risk; after all, one particular supply chain disruption drove down a company’s stock by 22%. The US SEC has responded by “clarifying” regulations with sweeping new rules, driving companies to readdress their cyber risk strategies.

    But what does this mean for your organization? If your team is considering relying on unexamined old processes, you may be rolling the dice more than you think.

    In this e-book, learn the top 4 ways your organization can avoid gambling with cyber risk disclosure, and discover everything you need to know about recent US SEC mandates.

Find more content like what you just read:

  • Computer Weekly – 7 March 2023: Can the UK keep its fintech crown?

    In this week's Computer Weekly, two years after the Kalifa report laid out a roadmap for continued fintech sector growth, UK entrepreneurs and startups are worried about the lack of progress. We look at the top tech trends in retail and find out which companies are leading the way. And we examine six ways to slash IT emissions. Read the issue now.

    Download

  • Computer Weekly – 16 July 2019: Reaping the benefits of digital transformation at Defra

    In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to blockchain technology

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

    Download

  • “Back to baseline”: How to escape legacy over-customization

    Discover in this ESG showcase how KPMG’s “Back to Baseline” streamlines processes, accelerate value realization for stakeholders, and readies organizations for the future of ServiceNow.

    Download

  • Computer Weekly - 19 October 2021: Making the case for and against police use of facial recognition technology

    In this week's Computer Weekly, as the Met Police enhances its facial recognition capabilities, we examine the pros and cons of law enforcement use of the technology. Three in five IT professionals want a new job – is there a tech exodus in the industry? And we take an in-depth look at the growth of the Nordic datacentre sector. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to supply chain security

    Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.

    Download

  • Infographic: Harvey Nash KPMG CIO Survey 2017

    This infographic from a survey of nearly 9,000 IT leaders in 90 countries shows how CIOs are managing change, prioritising innovation and digital technology, and reporting greater job satisfaction.

    Download

  • A Computer Weekly buyer's guide to edge datacentres

    Edge datacentres seem set for a post-pandemic resurgence. In this 17-page buyer's guide, Computer Weekly looks at what makes them such an appealing option, the role infrastructure as code has to play and what's driving company adoption.

    Download

  • Computer Weekly: Data Danger

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

    Download

  • Leader’s guide to strategic automation’s benefits

    “Hyperautomation is irreversible and inevitable,” explains Research VP at Gartner, Brian Burke. With that in mind, how can you maximize the benefits of hyperautomation at your organization? Dive into this ServiceNow e-book for insights and recommendations.

    Download

  • Integrating Brivo’s Access Control APIs in the Community Parking Garage

    Ledger, a modern, mixed-use destination workplace, needed a parking garage service that offered digital and mobile accommodation. With a joint solution from Parkable and Brivo eases Ledger’s administrative burden and saves money, providing easy-to-use digital booking with Brivo’s access control APIs ensuring security. Read on to learn more.

    Download

  • CIO Trends #9

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision-makers, such as the rise in IT buying decisions from outside the IT department, the importance of ethics in technology, and a look at how the Department for the Environment, Food and Rural Affairs is preparing its IT for the challenges of Brexit.

    Download

  • Using AIOps to Thwart Data Breaches

    At 83%, a vast majority of businesses studied in the “2022 Cost of a Data Breach” report experienced more than one data breach. Take a look through this white paper to learn how, by leveraging AIOps, you can protect your organization from a similar fate.

    Download

  • CW Middle East Jan to Mar 2018

    The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.

    Download

  • How to accelerate your risk and compliance initiatives—and get to value faster

    Explore in this e-book some of the top risk and resilience management solutions available to your organization that can help you break silos, help embed risk and compliance management into daily work, and improve performance through risk-informed decisions.

    Download

  • CIO Trends #10: Benelux

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

    Download

  • 10 benefits of AI-powered identity compliance

    Meeting and maintaining compliance entails high volumes of work, often comprised of tedious, repetitive and redundant tasks. With AI you can meet compliance, secure identities, and save resources by automating these tasks. Read this e-book to learn more.

    Download

  • Identity security: Transforming how organizations meet regulatory compliance

    Meeting regulatory compliance is a complex challenge that can introduce further challenges into already difficult business. SailPoint AI-driven identity security ensures authorized access to sensitive data, allowing for an easier compliance process through the following benefits. Read on to learn more.

    Download

  • CW APAC, May 2022: Trend Watch: Datacentres

    In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.

    Download

  • A Computer Weekly buyer's guide to anti-ransomware

    The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.

    Download

  • Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data

    In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.

    Download

  • Top 10 Australian IT stories of 2019

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at how the country is harnessing cutting-edge technologies to solve problems, while paving the way for emerging areas such as open banking.

    Download

  • IT Priorities 2020: European IT budget share reflects home-working challenges brought by Covid

    European organisations are being forced to redivert more limited budgets during the pandemic. This Eguide dives into the reasons as to how and why this shift is occurring in IT companies across the continent.

    Download

  • Cloud security & IAM: Security essentials

    Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.

    Download

  • CW Innovation Awards: SIA taps blockchain for loyalty app

    In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.

    Download

  • Computer Weekly – 19 March 2019: How IT leaders should work with marketing

    In this week's Computer Weekly, experts advise on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at a key ethical aspect of AI – how to explain the decisions an AI makes. Read the issue now.

    Download

  • Empower users and free IT teams with modern identity security

    With drastic increases in the number of digital threats, modern IT departments are easily bogged down. This e-book explores 5 best practices for how IT teams can utilize identity security to deal with the overwhelming volume of security tasks and improve efficiency, including. Read on to learn more.

    Download

  • Computer Weekly - 10-16 September 2019: A tech boost for social care

    In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.

    Download

  • Computer Weekly – 12 December 2023: Shaping the modern workplace

    In this week's Computer Weekly, we examine how the shift to cloud services and the need to deal with a hybrid workforce have changed modern IT. The emerging area of computational storage promises performance boosts for demanding workloads – we look at the challenges. And we find out how Zoom plans to exploit GenAI. Read the issue now.

    Download

  • Guide to Flexible Working

    This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.

    Download

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

    Download

  • CW APAC October 2023 – Buyer’s guide to IAM

    Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.

    Download

  • Computer Weekly – 21 June 2022: Dreams come true – how data and communication saved a failing company

    In this week's Computer Weekly, the former CEO of bed retailer Dreams explains how digital, data and communication helped turn round a failing company. The UK government has a new digital strategy – but it all seems rather familiar. And we talk to the tech firms trialling a four-day working week. Read the issue now.

    Download

  • Identity trends for 2023

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

    Download

  • Defining and Using Master Data Management

    PH

    Download

  • Customer experience insights guide

    According to a recent study, every year $98 billion is lost by companies failing to provide “simple” experiences that customers want. This report provides a complete breakdown of the current state of customer experience, looking at the key trends defining the modern customer’s demands. Read on to learn more.

    Download

  • A Computer Weekly buyer's guide to cyber insurance

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

    Download

  • Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities

    In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.

    Download

  • CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?

    According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.

    Download

  • Focus: Diversity

    This e-guide focuses on diversity in the workplace and how it can help contribute to better business outcomes.

    Download

  • IAM: Key to security and business success in the digital era

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

    Download

  • Royal Holloway: Secure connected and autonomous vehicles - the long road ahead

    Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.

    Download

  • How to manage an endless stream of digital identities

    The quantity of identities that most organizations are responsible for is so overdeveloped, that for many, manual identity management is no longer possible.SailPoint has developed their own AI-driven identity security solution, designed to affectively mitigate the risks presented by unmanaged identities. Download now to learn more.

    Download

  • Managing third-party identity risk

    Today’s organizations no longer reside behind a digital perimeter, with countless other third-party entities presenting access risk. SailPoint Non-Employee Risk Management aims to bolster identity security by extending advanced governance controls to large and complex populations of non-employee users. Download this data sheet to learn more.

    Download

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

    Download

  • Free up IT resources with SailPoint Identity Security

    Business IT is both a marathon and a sprint. SailPoint Identity Security uses automation to streamline operations, allowing your IT team to reallocate its resources to focus on higher value initiatives. Watch this video now to learn more about the benefits of SailPoint identity security.

    Download

  • The ultimate guide to Robotic Process Automation (RPA)

    Robotic process automation is a hot commodity in today's enterprises -- its impact has been described as transformational and disruptive. Still, RPA software is not without risks. In this e-guide, we explain everything you need to know for a successful RPA implementation, from the basics to analysis of where this rapidly evolving market is headed.

    Download