Web Content Security Hardware Reports

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

A Computer Weekly Buyers Guide to IoT
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Designing the Ideal Digital Work Experience for the Next Generation of Innovators
sponsored by Dell Technologies and Intel
ESG: User expectations for their digital work experience can vary by demographic, location, role and much more. But understanding these expectations is critical to the whole organization's long-term viability. Download this ESG report to explore the results of a comprehensive survey so you can design the ideal digital work experience.
Posted: 10 May 2023 | Published: 10 May 2023

TOPICS:  Hardware
Dell Technologies and Intel

LogRhythm's Security Analytics Platform: Product Overview
sponsored by LogRhythm, Inc.
EGUIDE: In this expert e-guide, uncover an artificial intelligence engine that takes security to a completely different level than ever before. Uncover how to leverage big data technologies to help mitigate the risk of targeted, persistent threats.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco Umbrella and Dimension Data

How virtual desktops simply end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com