RESEARCH CONTENT:
Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.
EGUIDE:
In this e-guide we focus on managed security service providers. We look at how the channel is increasingly aware of the need for MSSPs to meet the demands of customers and the need to adapt and modernise former approaches.
EGUIDE:
In this e-guide, we'll take a look at how some of the world's biggest financial brands are moving to the cloud, and share a cautionary tale or two about the mistakes some have made while trying to get there.
EGUIDE:
With an increasingly challenging threat landscape, being a successful MSSP can be a struggle. Making sure customers stay safe is critical to the success of your business, which is why understanding what makes a great MSSP is crucial for you to be able to make informed choices that will prove beneficial to the company.
EGUIDE:
Collecting COVID-19 workforce health information is riddled with potential missteps. That's why HR needs to revisit compliance and data collection basics. Get expert tips on protecting employee data during COVID-19 in this expert guide.
EGUIDE:
There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise.
EGUIDE:
Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.
EGUIDE:
Check out this e-guide for a comprehensive overview of some of the storage industries most fundamental topics— like replication vs. backup—to make sure you are taking advantage of everything they have to offer your organization.
EZINE:
When the war between Hamas and Israel began, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. Read the issue now.