Directory Publishers Reports

IT Priorities 2021 - European Topics Infographic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.
Posted: 08 Feb 2021 | Published: 14 Dec 2020

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

How Access to Care Is Affected by Inaccurate Provider Data from Payers
sponsored by XtelligentMedia Healthcare
EGUIDE: When payers' online provider information is wrong, it may impact not only members' access to care but also the level of member-payer trust.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

XtelligentMedia Healthcare

Sharepoint E-zine Vol.4: Balancing SharePoint Governance
sponsored by TechTarget Search Windows Server
EZINE: SharePoint has built-in features that allow site owners to create site maps without any custom coding at all.
Posted: 18 Nov 2008 | Published: 18 Nov 2008

TechTarget Search Windows Server

SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by TechTarget Search Windows Server
EZINE: SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009

TechTarget Search Windows Server

Computer Weekly - 14 December 2021: The rules for a safer internet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the government publishes the Online Safety Bill, we look at what the laws mean for internet services. A ransomware victim shares the insider story of the trauma of losing their corporate IT systems. And we ask, what happens when quantum computers get too powerful to verify their output? Read the issue now.
Posted: 12 Dec 2021 | Published: 14 Dec 2021

TechTarget ComputerWeekly.com

Global Threat Report
sponsored by Elastic
RESEARCH CONTENT: The last year has seen a massive range of threats from both new and established criminals - delivering an onslaught of attacks designed to leave security teams unaware and overwhelmed. Browse this 60-page research report to discover threat phenomena, trends, and expert recommendations designed to help your organization prepare for the future.
Posted: 15 Feb 2024 | Published: 15 Feb 2024

TOPICS:  .NET
Elastic

Presentation Transcript: Getting Started with Unified Communications in an Exchange 2007 Environment
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Check out this webcast transcript to learn how to implement Office Communications Server in a Microsoft Exchange environment, looking at unified communications solutions encompassing unified messaging, data web conferencing and audio conferencing.
Posted: 26 Feb 2009 | Published: 26 Feb 2009

DellEMC and Intel®

Sharepoint E-zine Vol.1: Governance Implementation Management
sponsored by TechTarget Search Windows Server
EZINE: SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

TechTarget Search Windows Server

eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE: This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009

Information Security Magazine

Zero Trust Privilege
sponsored by Delinea
EBOOK: Discover how Zero Trust Privilege can secure remote access, enable cloud migration, ensure compliance, and accelerate digital transformation. This in-depth e-book explores the benefits and implementation strategies. Read it now.
Posted: 06 Jul 2022 | Published: 10 Jul 2024

Delinea

Urban Myths About Secure Coding
sponsored by Veracode, Inc.
EBOOK: Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Read this e-book which is designed to rectify these misconceptions by presenting six common urban myths about secure coding and giving practical guidance for how to overcome them.
Posted: 23 May 2022 | Published: 23 May 2022

TOPICS:  .NET
Veracode, Inc.

Getting Started with Zero Trust Access Management
sponsored by Okta
EBOOK: For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TOPICS:  .NET
Okta

Overview of FaxBack's Workflow Integration: An in Depth Look at Managing the Flow of Faxes
sponsored by FaxBack, Inc.
PRODUCT LITERATURE: NET SatisFAXtion's Workflow Integration suite helps companies manage the flow of incoming faxes by providing a flexible, paperless option to automatically store faxes as TIFF images or PDF documents.
Posted: 08 Mar 2007 | Published: 01 Jan 2005

FaxBack, Inc.

Why Digital Transformation Can’t Wait
sponsored by BrightSpot
WHITE PAPER: With customer behaviors changing faster than most organizations can handle, many are struggling to find the tools and strategies to keep up and provide their customers with stellar experiences. A centralized content hub and management system may be able to help. Browse this white paper to learn more.
Posted: 11 May 2023 | Published: 11 May 2023

TOPICS:  .NET
BrightSpot

Data governance more important now than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
Posted: 08 Feb 2021 | Published: 11 Jun 2019

TechTarget ComputerWeekly.com

Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE: This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009

Information Security Magazine

IAM: Key to security and business success in the digital era
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 08 Feb 2021 | Published: 15 Nov 2018

TechTarget ComputerWeekly.com

Privileged Access Management
sponsored by Delinea
EBOOK: This e-book provides a practical understanding of Privileged Access Management (PAM) - what privileged accounts are, where they reside, and how to protect them from cybercriminals. Learn how to secure remote access and build user trust. Download the full e-book to learn more.
Posted: 06 Jul 2022 | Published: 10 Jul 2024

Delinea

Is a Storage Cache or Tiered Storage Best for VDI Performance?
sponsored by Micron Technology
EGUIDE: In this guide, discover the key differences between tiered storage and cache. In addition, you'll learn the top use cases for each to help you determine which one you should be leveraging in your virtual environment.
Posted: 08 Feb 2021 | Published: 06 Jun 2016

Micron Technology

Scale, manage and secure your support experiences
sponsored by TeamViewer
PRODUCT OVERVIEW: Enterprises need a solution that standardizes, harmonizes and streamlines their support experiences. Learn how you can navigate complex IT processes, optimize operations and provide faster support to your customers, employees and partners in a seamless and secure manner with TeamViewer in this resource.
Posted: 14 Dec 2023 | Published: 14 Dec 2023

TOPICS:  .NET
TeamViewer

Presentation Transcript: Building and Integrating Unified Communications
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Check out this transcript of a webcast sponsored by Dell and Microsoft to learn why a Unified Communication Solutions from Dell is easy to implement, less disruptive to daily operations and is designed to deliver outstanding ROI for existing Windows environments.
Posted: 26 Feb 2009 | Published: 26 Feb 2009

DellEMC and Intel®

Ransomware Scenario Emulation
sponsored by Illumio
PROCEEDINGS: In order to overcome ransomware, organizations need offerings that can handle the most dangerous malware. This paper presents the results of an array of attack simulations aimed at testing the security capabilities of Illumio’s Core offering. Read on to learn more about Illumio Core and see how it performs against emulated threats.
Posted: 06 Oct 2022 | Published: 06 Oct 2022

TOPICS:  .NET
Illumio

FBI warns of global ATM cyber crime spree
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The FBI has issued a warning to banks that cyber criminals are planning to steal millions in a coordinated worldwide attack on cash machines
Posted: 08 Feb 2021 | Published: 22 Aug 2018

TechTarget ComputerWeekly.com

Understanding Today’s Threat Actors
sponsored by Fortinet, Inc.
RESEARCH CONTENT: Latest research reveals threat actors often use valid credentials for initial access. Read now for tips on boosting detection, response and security to protect your organization from discovery, lateral movement, data theft and disruption.
Posted: 28 Mar 2024 | Published: 28 Mar 2024

TOPICS:  .NET
Fortinet, Inc.