Push Messaging

Push Messaging Reports
Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 18 Nov 2021 | Published: 30 Jun 2020

Proofpoint

2022 ASEAN Salary Survey - Future Work Infographic
sponsored by ComputerWeekly.com
INFOGRAPHIC: The results are in for the 2022 Career and Salary Survey. With over 300 respondents who work in the ASEAN IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.
Posted: 04 May 2022 | Published: 04 May 2022

ComputerWeekly.com

2021 Vendor Showdown: IT Service Management Providers
sponsored by ServiceNow
WHITE PAPER: Read this paper for Gartner's profile of vendors in the Enterprise ITSM tool market and find out why Gartner named ServiceNow a Leader 7 years in a row.
Posted: 14 Apr 2022 | Published: 14 Apr 2022

TOPICS:  IT Management
ServiceNow

Computer Weekly - 23 November 2021: Can the tech community show how to save the world?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.
Posted: 22 Nov 2021 | Published: 23 Nov 2021

ComputerWeekly.com

Computer Weekly - 7 December 2021: Spy tech gets high tech – why MI6 invests in startups
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we're used to James Bond and his gadgets, but now MI6 is investing in tech startups to develop new intelligence capabilities. Our exclusive IT Priorities survey suggests IT leaders are optimistic about 2022. And our new buyer's guide examines the latest emerging technologies. Read the issue now.
Posted: 06 Dec 2021 | Published: 07 Dec 2021

ComputerWeekly.com

Trust no one: Why zero trust security is taking the world by storm
sponsored by ComputerWeekly.com
EGUIDE: As zero-trust strategies continue to grow, we take a look into the history and evolution of the zero-trust approach, the main challenges involving zero-trust implementation in 2022, and what APAC firms can do to stay ahead of cyber threats.
Posted: 18 Feb 2022 | Published: 18 Feb 2022

ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

MicroScope – January 2022: Squaring up to ransomware
sponsored by MicroScope
EZINE: In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
Posted: 06 Jan 2022 | Published: 07 Jan 2022

MicroScope

Deliver a CMDB with true business value: 6 essential steps
sponsored by ServiceNow
WHITE PAPER: An unhealthy CMDB can be damaging to an organization. A healthy CMDB, however, can do just the opposite. However, a healthy CMDB doesn’t just happen. You need to identify clear objectives and develop a comprehensive strategy first. Open up this eBook to check out 6 essential steps towards creating and maintaining a healthy CMDB in your oranization.
Posted: 14 Apr 2022 | Published: 14 Apr 2022

TOPICS:  IT Management
ServiceNow

Get Started with Threshold Monitoring
sponsored by Beta Systems
EGUIDE: Download this E-Guide to learn best practices for threshold monitoring including tips on defining thresholds, alerting configuration, and tips on establishing reporting processes.
Posted: 04 Nov 2021 | Published: 15 Jun 2020

Beta Systems