Search Results for: security

Computer Weekly – 17 July 2018: How container technology is evolving
In this week's Computer Weekly, as adoption of containers grows rapidly, we look at the choices and potential benefits of the technology, the efforts being made to secure internet of things devices and how the latest Brexit plans will affect the UK tech sector. Read the issue now.

TechTarget ComputerWeekly.com

Zero-Trust Privileged Access Management (PAM) for every user on every device from every location
Weak and stolen credentials are the leading causes of data breaches. Keeper's privileged access management (PAM) platform provides complete visibility, security, and control across every user on every device. Learn how to secure remote access and protect your organization by reading the full data sheet.

Keeper Security Inc

Fraud management: A perennial business issue
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

TechTarget ComputerWeekly.com

Zero-Trust KeeperPAM, Directly in the Vault
As devices proliferate, access management grows more complex – and challenging. To help your organization address that issue, Keeper Security developed a platform for unifying passwords, secrets and connections. For a comprehensive introduction to the tool, Zero-Trust KeeperPAM, watch this webcast.

TOPICS: .NET
Keeper Security Inc

Computer Weekly – 27 February 2018: How IT is taking UPS to new heights
In this week's Computer Weekly, we talk to UPS CIO Juan Perez to find out how making his IT department "business intimate" is driving innovation. We look at how cloud management platforms can help ease the adoption of multiple public cloud services. And we examine how UK local councils are struggling to deal with cyber attacks. Read the issue now.

TechTarget ComputerWeekly.com

Hull University Teaching Hospital Improves Workflows with Real-Time Visibility of Assets
To help address rising incidents of chronic illness, an ageing population, more expensive drugs and a shortage of clinical staff, Hull University Teaching Hospitals NHS Trust, looks to new technology and is seen as a pioneering and innovative healthcare provider. In this case study, discover why they turned to Zebra for a new technology need.

TOPICS: .NET
Zebra Technologies

Cloud-Based Privileged Access Management
Discover why 82% of organizations want to move their on-premises Privileged Access Management (PAM) solution to the cloud. This research report explores the benefits of cloud-based PAM, including improved security, reduced costs, and easier deployment. Read the full report to learn how cloud-based PAM can help your organization.

Keeper Security Inc

The Internet Outage Survival Guide: Unpacking common outages types and how they impact your business
Today, business rely on the Internet more than ever. Yet, the Internet is as unpredictable as it is critical. It's a "best-effort" collection of networks connecting a myriad of providers, and at its very core, the Internet is vulnerable to outages. In this e-book, learn how you can mitigate the risk of an Internet outage.

Cisco ThousandEyes

Royal Holloway: Driverless vehicle security for military applications
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

TechTarget ComputerWeekly.com

Enhancing Healthcare Security: NIST Framework and Health Breach Notification Rule
The collection of best practices and standards found in the NIST Cybersecurity Framework can help healthcare organizations improve their overall security postures.Vendors of personal health records, including health apps and other non-HIPAA-covered businesses, are subject to the Federal Trade Commission's Health Breach Notification Rule.

XtelligentMedia Healthcare