URL Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Security Products for Protection: Endpoint and Anti-Malware
sponsored by Carbon Black
EGUIDE: Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
Posted: 08 Feb 2021 | Published: 21 Aug 2017

Carbon Black

Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017

TechTarget ComputerWeekly.com

A-core Fortifies Cybersecurity
sponsored by Bitdefender
CASE STUDY: After a close call with a ransomware attack, A-Core Concrete Specialists’ IT team decided they needed a more prepared and mature endpoint and email security operation. By partnering with Bitdefender, A-Core were able to combine several of their offerings and create a more secure operation while saving time and energy. Read on to learn more.
Posted: 10 Feb 2023 | Published: 11 Feb 2023

TOPICS:  .NET
Bitdefender

How Van Horn Improves Employee Training By 20%
sponsored by T-Mobile for Business
CASE STUDY: “Amaze Our Customers”: This is Van Horn Automotive Group’s philosophy. To continue fulfilling that mission, Van Horn set out to transform its communications system. This case study maps out the journey, breaking down how, in addition to modernizing its communications, Van Horn improved its onboarding training. Read on for more details.
Posted: 18 Jul 2024 | Published: 18 Jul 2024

T-Mobile for Business

Unified Communications: One Simple Tool to Help Avoid the Hang-Ups of Legacy Voice Systems
sponsored by T-Mobile for Business
ANALYST REPORT: As SMBs grapple with increasingly competitive situations where connectivity between employees and customers is essential, unified communications (UC) solutions have risen to the occasion. Further explore the role UC plays in reducing the need for dedicated internal resources and cutting costs for SMBs in this IDC report.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TOPICS:  .NET
T-Mobile for Business

The Secure Coding Handbook
sponsored by Veracode
EBOOK: This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023

TOPICS:  .NET
Veracode

Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com

Understanding How Businesses Can Leverage the Fixed Wireless Access Opportunity
sponsored by T-Mobile for Business
ANALYST REPORT: Fixed wireless access (FWA) is a powerful and cost-effective option for shoring up connectivity for businesses operating in both rural and urban areas while also streamlining the connectivity experience for businesses with distributed locations. Read on to learn how you can meet your organization’s connectivity needs with FWA.
Posted: 15 Jul 2024 | Published: 15 Jul 2024

T-Mobile for Business

The Benefits Of AI And Automation For Smbs And How 5G Can Help Amplify Them
sponsored by T-Mobile for Business
ANALYST REPORT: With 71% of U.S. small and medium businesses planning to increase their IT spending in the next 12 months, many of these organizations are looking to AI and automation tools to improve their operational efficiency. But what exactly are the benefits of AI and automation? Access this report to learn more.
Posted: 12 Jul 2024 | Published: 13 Jul 2024

TOPICS:  .NET
T-Mobile for Business

Automated Threat Analysis
sponsored by Splunk
EBOOK: Phishing and malware threats have become a huge concern for businesses both big and small. Download your complimentary copy of The Essential Guide to Automated Threat Analysis to learn more about how to identify and assess security threats without the need for extensive human intervention.
Posted: 23 Jul 2024 | Published: 24 Jul 2024

TOPICS:  .NET
Splunk

Effectively leveraging cloud-based contracts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cloud contracts offer great benefits, but they can put organisations at significantly greater risk than conventional IT service contracts. This report by consultant Bob Fawthrop explains how to mitigate the risks.
Posted: 08 Feb 2021 | Published: 18 Jan 2017

TechTarget ComputerWeekly.com

How Business Travelers and Remote Workers Benefit from Connectivity on the Go
sponsored by T-Mobile for Business
ANALYST REPORT: This white paper addresses considerations for SMBs to maintain secure, productive remote work, including:How to overcome challenges of public Wi-Fi and BYOD for mobile workBenefits of 5G for consistent coverage and enhanced securityRead the white paper now.
Posted: 16 Jul 2024 | Published: 16 Jul 2024

T-Mobile for Business

SonicWall Next-Generation Firewall Buyer’s Guide
sponsored by SonicWall
BUYER'S GUIDE: From network access control lists (ACLs) to unified threat management (UTM), from the 1990s to the 2020s, firewalls have evolved. Along with charting that evolution, this buyer’s guide digs into what constitutes a modern, next-generation firewall (NGFW) today. Read on to unlock those insights and much more.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  .NET
SonicWall

TotalJobs Group – Sitecore fills Web CMS vacancy at Totaljobs Group
sponsored by Hortonworks
CHANGEME:
Posted: 19 Sep 2024 | Published: 19 Sep 2024

TOPICS: 
Hortonworks

2024 Miercom Security Benchmark Compare the Top Enterprise Firewalls
sponsored by Checkpoint Software Technologies
INFOGRAPHIC: With such a narrow margin between defense and disaster, you need to make sure you have the most effective and functional firewall possible. This infographic presents the 2024 Miercom Security Benchmark for top enterprise firewalls, which uses attack-time metrics to compare the leading vendors. Download now to learn more.
Posted: 10 May 2024 | Published: 10 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018

TechTarget ComputerWeekly.com

The sped-up deployment of IoT on the back of "failure free" 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Research in November 2021 from Inmarsat Enterprise found that as many as 84% of businesses gave sped up deployment of IoT, or plan to, because of Covid.  In this guide, learn how businesses implementing IoT technologies are getting ahead of the competition across their value chains.
Posted: 10 Dec 2021 | Published: 10 Dec 2021

TechTarget ComputerWeekly.com

Unify Detection and Response across Your Entire Network with FortiEDR, FortiNDR Cloud, and FortiGate NGFW
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: Unify network and endpoint security with FortiEDR, FortiNDR Cloud, and FortiGate NGFW. Gain enriched detections, streamlined investigations, and faster response to stop threats across your environment. Read the white paper to learn more.
Posted: 07 Oct 2024 | Published: 08 Oct 2024

Fortinet, Inc.

Getting Started with Zero Trust Access Management
sponsored by Okta
EBOOK: For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TOPICS:  .NET
Okta

Mobile Unified Communications and Collaboration: The Gateway to AI for SMBs
sponsored by T-Mobile for Business
ANALYST REPORT: In this 2024 IDC report, unlock answers to 5 FAQs about unified communications and collaboration (UC&C) and AI.
Posted: 19 Jul 2024 | Published: 19 Jul 2024

T-Mobile for Business

Secure Connectivity for Devices and Users at the Network Edge
sponsored by Cradlepoint
EBOOK: Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
Cradlepoint

Bitdefender Penetration Testing Services
sponsored by Bitdefender
WHITE PAPER: Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.
Posted: 10 Feb 2024 | Published: 10 Feb 2024

TOPICS:  .NET
Bitdefender

Not If, But When: 4 1/2 Ways to Prepare for Future Industry Disruptions
sponsored by Zelis
WHITE PAPER: No one forgets the February 2024 data breach that brought the healthcare industry to a standstill. Are you prepared for the next disruption? Facing mounting compliance challenges and increasing cyberattacks, payers must fortify their systems. Download the Guide for 4 (and ½) ways National Health Plan leaders can prepare for what’s next.
Posted: 25 Sep 2024 | Published: 25 Sep 2024

TOPICS:  .NET
Zelis