Security Equipment Industry White Papers

(View All Report Types)
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Securing the Industrial Internet of Things
sponsored by Connections
INFOGRAPHIC: Securing the Industrial Internet of Things (IIoT) is critical as cybersecurity threats rise. Understand the IIoT threat landscape and learn how to assess OT and IIoT security with a 3-step approach. Download this infographic to discover best practices for minimizing risk and maximizing the returns of IIoT.
Posted: 19 Sep 2024 | Published: 20 Sep 2024

Connections

CW ASEAN: Defend against disruption
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

2024 Verkada Industry Report: State of Cloud Physical Security
sponsored by Verkada
EGUIDE: As cloud-based physical security systems gain widespread adoption, this report provides insights into the industry's transition. Key drivers include enhanced scalability, remote management, and integrated analytics. Download the full report to learn how cloud security can future-proof your organization.
Posted: 20 Sep 2024 | Published: 20 Sep 2024

Verkada

Transforming Industrial Engineering to Email
sponsored by Seeq
WEBCAST: AI-driven data analytics are transforming industrial engineering, but barriers to adoption remain. This webinar explores AI's impact, strategies for AI adoption, and how to empower engineers with the right knowledge and tools. Tune in now to find out how you can embrace this evolution and drive organizational growth.
Posted: 24 Jul 2024 | Premiered: Jul 24, 2024

Seeq

CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TechTarget ComputerWeekly.com

CW Middle East ezine July 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

Cyber Security 2016 and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

Trust Emerges as Cybersecurity Issue for 42% of Security Decision-Makers
sponsored by XtelligentMedia Healthcare
EGUIDE: With cyberattacks on the rise, trust in teams and technology is crucial. However, 42% of security leaders see a trust deficit as their biggest hurdle, a new survey showed. Some trust is also misplaced, with 66% of security leaders trusting employees to prevent cyberattacks more than their own teams. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023

XtelligentMedia Healthcare

Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
Posted: 08 Feb 2021 | Published: 26 Jul 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019

TechTarget ComputerWeekly.com

CIO Trends India
sponsored by TechTarget ComputerWeekly.com
EGUIDE: CIOs in India have been put to the test as their organisations implement remote work arrangements amid the Covid-19 pandemic. We look at the impact of the coronavirus outbreak on India's IT industry, why a pandemic specific BCP matters and how CIOs can harden up their datacentre equipment supply chains post-Covid-19.
Posted: 08 Feb 2021 | Published: 03 Jun 2020

TechTarget ComputerWeekly.com

CW Nordics - November 2020-January 2021: Bank branch closures continue as digital banking grows
sponsored by TechTarget ComputerWeekly.com
EZINE: Sweden's Handelsbanken is cutting its branch network by nearly half, which means more money will be invested in IT. But it's not just Sweden and the Nordics – banks across the world are watching the fintech industry demonstrate to consumers what banking can be like if the right technology is in place.
Posted: 08 Feb 2021 | Published: 26 Nov 2020

TechTarget ComputerWeekly.com

Balancing Security and Agility
sponsored by FinThrive
WHITE PAPER: Explore effective strategies for healthcare cyber resilience that balance security and agility. Learn how to develop incident response plans, implement continuous monitoring, and partner with the right RCM vendor to enhance data protection and operational continuity. Read the full white paper.
Posted: 13 Oct 2024 | Published: 14 Oct 2024

FinThrive

Four practical use cases for Industrial DataOps
sponsored by HighByte
BLOG: Most manufacturing companies know how leveraging industrial data can improve production, but they remain challenged as to how to scale-up to the enterprise level. Read how these four use cases reveal the ways Industrial DataOps can integrate your role-based operational systems with your business IT systems as well as those of outside vendors.
Posted: 30 Mar 2022 | Published: 25 Mar 2022

TOPICS:  .NET
HighByte

How Can Providers Create Successful Organizations for Accountable Care?
sponsored by XtelligentMedia Healthcare
EGUIDE: Providers must be prepared to address patient needs across the care continuum and be equipped with proper capabilities before joining or establishing an accountable care organization.
Posted: 09 Apr 2024 | Published: 09 Apr 2024

XtelligentMedia Healthcare

Contrast Security Application Detection and Response (ADR) Praised by Industry Analysts
sponsored by Contrast Security
BLOG: Contrast Security's Application Detection and Response (ADR) solution has been praised by industry analysts for addressing gaps in cybersecurity defenses. ADR provides visibility and context to prevent sophisticated attacks on applications and APIs. Read the full press release to learn more.
Posted: 10 Dec 2024 | Published: 11 Dec 2024

Contrast Security

Safeguard Your Organization: Top 6 Questions You Should Be Asking About Product Security
sponsored by Security Journey
WHITE PAPER: Safeguard your organization from security vulnerabilities. Learn the top 6 questions to ask about product security, including ensuring resilient code, integrating security best practices, and equipping your team with secure coding skills. Read the white paper to build a culture of security.
Posted: 16 Jan 2025 | Published: 16 Jan 2025

Security Journey

CW APAC: Trend Watch - Internet of Things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how APAC firms are putting the internet of things to good use in an increasingly connected world, yet technology integration and security concerns are holding back widespread adoption.
Posted: 08 Feb 2021 | Published: 15 Aug 2019

TechTarget ComputerWeekly.com

With The Most Powerful AI-Ready Workstations
sponsored by Softchoice
EBOOK: Discover the power of Lenovo's ThinkStation PX, P7, and P5 workstations to conquer your most demanding AI workloads. Equipped with the latest Intel® Xeon® processors, these high-performance devices enable you to bring big ideas to life across industries. Read the eBook to learn more.
Posted: 23 Nov 2024 | Published: 23 Nov 2024

Softchoice

Unlocking the circular economy in the print industry
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: There is a significant opportunity for organisations to gain economic and environmental benefits through operating a more efficient print environment, this report from analyst Quocirca reveals.
Posted: 08 Feb 2021 | Published: 13 Jul 2017

TechTarget ComputerWeekly.com

Authentication Best Practices: On and Off the Cloud
sponsored by HID Global
EGUIDE: Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 08 Feb 2021 | Published: 12 Oct 2016

HID Global

Catalyzing Smart Growth With Industrial Intelligence
sponsored by Aveva
WHITE PAPER: Discover how industrial intelligence can help chemical companies improve operational reliability, maximize performance, and accelerate engineering - all while supporting sustainability goals. Read the full white paper to learn more.
Posted: 01 Feb 2025 | Published: 01 Feb 2025

Aveva

DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER: How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
HighByte

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com