Search Results for: Simple Network Management Protocol

Passwordless: Identity Threat’s Nightmare
If you are wondering where to start your passwordless journey, this eBook is for you. While focusing on best practices in securing both the workforce and high-risk users, it explores different options for passwordless authentication, the specific security and compliance tradeoffs they entail, and more.

CyberArk

Monitoring Collaboration App Environments
Collaboration applications, such as Cisco Webex, Microsoft Teams, and Zoom, have redefined communication in the workforce. In this guide, you’ll learn about best practices for monitoring collaboration applications. Read on to learn more.

TOPICS: .NET
Cisco ThousandEyes

Computer Weekly – 10 October 2017: The most influential women in UK IT
In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cyber insurance
In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

TechTarget ComputerWeekly.com

AI: Beyond the hype
Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery
With businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.

TechTarget ComputerWeekly.com

Navigating Section 524B
The FDA's new Section 524B mandates cybersecurity requirements for medical devices. This guide covers navigating the regulations, including monitoring vulnerabilities, secure design, patching, and software bill of materials. Read the full guide to learn how to ensure your medical devices meet the new cybersecurity standards.

Wind River

MicroScope – October 2019: What's next for the channel?
The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly

MicroScope

Don't wait until it's too late: Add security to keep identity real
A recent study found that 51% of people use the same password for work and personal accounts. Stolen credentials allow hackers to bypass your security measures, with overlapping and weak passwords making theft an even greater risk. This white paper is designed to help you find the solution right for your organization. Read on to learn more.

TOPICS: .NET
WatchGuard Technologies, Inc.

CW ASEAN – January 2019: Dive into microservices
In this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.

TechTarget ComputerWeekly.com