Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER:
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009
|
|
|
Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER:
This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK:
The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024
|
|
|
Domain Name System (DNS) Security
sponsored by Cisco
GARTNER RESEARCH REPORT:
SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
Posted: 07 Sep 2024 | Published: 07 Sep 2024
|
|
|
Who will win the world's biggest cloud contract?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Aug 2019
|
|
|
CMMC 2.0 for MSPs: Everything You Need To Know
sponsored by Scalepad Software
WHITE PAPER:
The Cybersecurity Maturity Model Certification (CMMC) framework is designed to support and guide MSPs working with the US Department of Defense. This white paper presents a guide to the CMMC, breaking down the essential information so that you can navigate its more complex features. Read on to learn more.
Posted: 15 Apr 2024 | Published: 16 Apr 2024
|
|
|
AWS Re:Invent 2019: What CIOs need to know from this year's show
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The Amazon Web Services (AWS) Re:Invent user conference saw 65,000 users, developers and business leaders convene in Las Vegas to hear news about the firm's innovation priorities. In this e-guide, we provide a round-up of all the big stories and announcements from this year's Re:Invent, and give readers some clues as to where AWS is heading next.
Posted: 08 Feb 2021 | Published: 09 Dec 2019
|
|
|
An OT - Cyber Physical Security Journey eBook for the US Federal Government
sponsored by Merlin International
EBOOK:
Discover how to secure your federal government's OT and cyber-physical systems with a comprehensive security journey. Learn the critical steps, from asset visibility to continuous monitoring, to reduce your attack surface. Download the eBook to get started.
Posted: 18 Dec 2024 | Published: 19 Dec 2024
|
|
|
Addressing Zero Trust for Government: The Role of Identity Security
sponsored by Merlin International
WHITE PAPER:
As governments adopt Zero Trust, identity security is critical. This white paper explores the role of identity security in a Zero Trust architecture, including five key principles and six focus areas to get started. Learn how the CyberArk Identity Security Platform can help you implement a successful Zero Trust strategy.
Posted: 11 Oct 2024 | Published: 11 Oct 2024
|
|
|
A Partner in Your Zero Trust Journey
sponsored by Merlin International
PRODUCT OVERVIEW:
Merlin Cyber's Zero Trust Assessment helps federal agencies evaluate their Zero Trust maturity and develop an actionable plan to achieve their Zero Trust goals. Learn how Merlin Cyber can guide your agency's Zero Trust journey - read the full content.
Posted: 03 Oct 2024 | Published: 04 Oct 2024
|
|
|
Top 10 broadband stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The European broadband industry in 2019 was a place of huge activity and investment, with one overarching theme – full-fibre roll-out. The fundamental benefit of such networks seemed as crystal clear as the fibres themselves – support for business transformation. Here are Computer Weekly's top 10 networking stories of 2019.
Posted: 08 Feb 2021 | Published: 24 Dec 2019
|
|
|
Why cloud? Why now? A Qlik Cloud Comparison Guide
sponsored by Qlik
BUYER'S GUIDE:
Discover the advantages of a modern, AI-powered cloud analytics platform. This Qlik Cloud Comparison Guide highlights key differences from on-premises solutions, including enhanced security, data management, AI-powered analytics, machine learning, and automation. See how Qlik Cloud elevates your analytics. Read the Qlik Cloud Comparison Guide
Posted: 13 Dec 2024 | Published: 14 Sep 2024
|
|
|
Why cloud? Why now? A Qlik Cloud Comparison Guide
sponsored by Qlik
BUYER'S GUIDE:
Discover the advantages of a modern, AI-powered cloud analytics platform. This Qlik Cloud Comparison Guide highlights key differences from on-premises solutions, including enhanced security, data management, AI-powered analytics, machine learning, and automation. See how Qlik Cloud elevates your analytics. Read the Qlik Cloud Comparison Guide
Posted: 13 Sep 2024 | Published: 14 Sep 2024
|
|
|
Computer Weekly - 31 March 2020: Can the internet take the strain?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as millions of people work from home, we examine the measures in place to make sure the internet stays up and running. Our latest buyer's guide looks at the best practice in application modernisation. And we find out how IT leaders are tackling the skills shortage to recruit the best tech talent. Read the issue now.
Posted: 08 Feb 2021 | Published: 31 Mar 2020
|
|
|
CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
sponsored by TechTarget ComputerWeekly.com
EZINE:
According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
Posted: 08 Feb 2021 | Published: 11 Feb 2021
|
|
|
Top 10 cloud stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK:
There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.
Posted: 24 Jan 2022 | Published: 24 Jan 2022
|
|
|
Top 10 cloud stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Adopting a hybrid-centric or multicloud strategy is increasingly becoming the favoured approach for many enterprises, including those operating in verticals that were previously sceptical or too tightly regulated to consider moving to the cloud in the past. Here's a look back over Computer Weekly's top 10 cloud stories of 2019.
Posted: 08 Feb 2021 | Published: 28 Jan 2020
|
|
|
Zero Trust, Simplified Benefits of the CoIP® Platform Overlay
sponsored by Zentera Systems Inc.
WHITE PAPER:
Explore the simplified benefits of Zentera's CoIP Platform for implementing a robust Zero Trust architecture. Learn how this software-defined approach can reduce your attack surface, enable rapid compliance, and avoid costly infrastructure changes. Read the white paper to get started.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Dell PowerStore Resiliency
sponsored by Dell Technologies
ESG TECHNICAL VALIDATION REPORT:
Enterprise Strategy Group reviewed the new Dell PowerStore Prime solution’s capabilities and assessed how it would benefit customers. PowerStore Prime offers local, remote, and cloud data protection capabilities that ensures an organization’s data is highly available and resilient against cyberthreats. Read the ESG report now.
Posted: 09 Sep 2024 | Published: 09 Sep 2024
|
|
|
Dell PowerStore Resiliency
sponsored by Dell Technologies
ESG TECHNICAL VALIDATION REPORT:
Many organizations are seeking defense and resiliency through disaster recovery and storage security. Dell Technologies recently announced PowerStore Prime, a comprehensive, integrated offering that combines new all-flash storage advancements with strategic business advantages. Read this Enterprise Strategy Group report to learn more.
Posted: 04 Nov 2024 | Published: 05 Nov 2024
|
|
|
PowerEdge - Cyber Resilient Infrastructure for a Zero Trust world
sponsored by Dell Technologies and Intel
WHITE PAPER:
As data is accessed across devices, on-premises and in the cloud, high-impact data breaches continue to mount. To maintain a more secure environment, businesses must be more comprehensive in their approach. Access this white paper now to learn how.
Posted: 09 Sep 2024 | Published: 09 Sep 2024
|
|
|
Securely Moving to the (Government) Cloud
sponsored by Cisco
ANALYST REPORT:
It’s no secret that FedRAMP compliance is the staple of government cloud operations. This SANS white paper examines the security requirements of cloud-based resources as well as how you can best position your agency for that transition. Download and read the SANS white paper now to learn more.
Posted: 06 Sep 2024 | Published: 06 Sep 2024
|
|
|
Computer Weekly - 2 February 2021: Business intelligence helps ambulance service's pandemic response
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how one ambulance service is using business intelligence tools to join up datasets to improve its response to the Covid-19 pandemic. Our latest buyer's guide examines video conferencing and collaboration. And we look at the benefits of real-time streaming data analytics. Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Feb 2021
|
|
|
Legacy PKI Migration
sponsored by Venafi
WHITE PAPER:
52% of the 2500 participants surveyed by the Ponemon Institute reported that their organizations have poor visibility of apps that rely on Public Key Infrastructure (PKI). Along with exploring that obstacle, this white paper considers other challenges that legacy PKI can pose. To unlock those insights and more, read on.
Posted: 25 Oct 2023 | Published: 25 Oct 2023
|
|
|
The SUSE Guide to Edge Computing in a Cloud Native World 2022
sponsored by SUSE
EBOOK:
What really is edge computing? And how are near edge, far edge and tiny edge different? This guide explains what edge computing means for your business and how you can take advantage of it in a cloud native world. Read it here.
Posted: 19 Sep 2022 | Published: 20 Sep 2022
|
|
|
Enhance security with automation
sponsored by Red Hat
EGUIDE:
Explore how automation enhances security by unifying investigation, threat hunting, and incident response across an organization. Learn from customer success stories using Red Hat Ansible Automation Platform to boost productivity, efficiency, and security posture. Read the e-book to discover how automation strengthens your security approach.
Posted: 08 Oct 2024 | Published: 08 Oct 2024
|
|
|
CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business
sponsored by TechTarget ComputerWeekly.com
EZINE:
Computer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.
Posted: 08 Feb 2021 | Published: 07 May 2020
|
|