IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed   
Signatures Reports
 
Computer Weekly - 14 July 2020: Is digital art coming of age during lockdown?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the pandemic forces many sectors into a business rethink, digital art is hoping to capitalise on changing times. Chinese supplier Lenovo is dominating the supercomputer market – we examine how it got there. And as datacentre engineers become key workers, we look at the health and safety issues. Read the issue now.
Posted: 10 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Case Study: Hospital I.T. Infrastructure
sponsored by CDW Healthcare
CASE STUDY: Building a brand new, state-of-the-art medical campus from the ground up requires an I.T. infrastructure capable of supporting newer, more advanced healthcare applications and the massive volumes of digital data generated by these systems. Read this white paper to learn how CDW Healthcare helped a Michigan medical campus to accomplish their goals.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

CDW Healthcare

Build your Content Security and Document Management Plan
sponsored by Adobe
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe

Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

Australia Post Uses New Relic Observability to Manage Pandemic Challenges
sponsored by New Relic
CASE STUDY: In Australia, coronavirus lockdown measures shifted consumer demands in a rush normally associated with the holiday season. Learn how the Australia Post scaled to meet rising customer demands with the help of New Relic.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

New Relic

Ransomware: Paying Hackers Is A Losing Game
sponsored by Veritas
EBOOK: Ransomware: Paying Hackers Is A Losing Game
Posted: 11 Sep 2020 | Published: 11 Sep 2020

TOPICS:  Security
Veritas

Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

Dunkirk Enhances Microsoft 365 Email Security with Vade Secure for Microsoft 365
sponsored by Vade Secure
CASE STUDY: The victim of targeted attacks, the city and urban community of Dunkirk sought to bolster their defenses against email-based cyberattacks. This case study provides an overview of Dunkirk’s selection criteria as well as the results of their email security project – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


Redefining Enterprise Digital Transformation
sponsored by New Relic
WHITE PAPER: Time and time again, simplicity has proven to be more effective than sophistication. That’s why New Relic’s observability platform focuses on simplifying service delivery with tools for cloud-native applications and easily accessible data visualization. Learn how ANZ Bank benefitted from New Relic’s simplicity here.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

TOPICS:  IT Management
New Relic

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info