Perimeter Security Reports

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
Posted: 08 Feb 2021 | Published: 27 Oct 2017

TechTarget ComputerWeekly.com

Network security in the post-pandemic era
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.
Posted: 27 Oct 2021 | Published: 27 Oct 2021

TechTarget ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 May 2018

TechTarget ComputerWeekly.com

How Retailers Use LTE as Wireless WAN to Improve Service & Operations
sponsored by Cradlepoint
WHITE PAPER: Innovation is changing retail from the storefront to the back office and beyond. Because of this transformation, IT teams and the enterprise networks they manage have never been more important. In this white paper, explore emerging trends in retail IT and considerations for choosing futureproof edge network solutions for retail.
Posted: 08 Feb 2021 | Published: 20 May 2020

Cradlepoint

Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
Posted: 20 Dec 2021 | Published: 21 Dec 2021

TechTarget ComputerWeekly.com

SeatonCorp Delivers Low Cost, High Reliability Virtual Desktops via Quest vWorkspace
sponsored by Dell Software
WHITE PAPER: Read this case study to see how the benefits of Quest® Software's vWorkspace helped SeatonCorp achieve lower cost, enhanced capabilities, higher reliability, easier management and easier end-user IT support.
Posted: 29 Jun 2009 | Published: 26 Jun 2009

Dell Software

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine