Hunting Industry White Papers

(View All Report Types)
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

What generative AI's rise means for the cybersecurity industry
sponsored by TechTarget ComputerWeekly.com
EGUIDE: ChatGPT's cultural and economic ascent in recent months has led to an interest in generative AI as a whole, and that moment has included cybersecurity. However, experts differ on whether the moment is more steeped in marketing or emerging technology.
Posted: 19 Jun 2023 | Published: 19 Jun 2023

TechTarget ComputerWeekly.com

The technological evolution of IT industry leaders: Part two
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.
Posted: 08 Feb 2021 | Published: 26 Feb 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019

TechTarget ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TechTarget ComputerWeekly.com

RCM for MSOs: Driving Value Creation with Revenue Cycle Optimization
sponsored by MD Clarity
WHITE PAPER: Explore strategies to optimize revenue cycle management for management services organizations (MSOs). Discover how to pursue payer underpayments, update chargemasters, and improve net revenue forecasting. Read the full white paper to uncover valuable insights.
Posted: 03 Oct 2024 | Published: 03 Oct 2024

MD Clarity

PREVENTING NEXT-GENERATION THREATS THROUGH AI AND INNOVATION
sponsored by Checkpoint Software Technologies
WHITE PAPER: The current threat landscape is more untenable than ever before. Enter artificial intelligence (AI). By integrating AI into security technologies, organizations can enhance threat prevention. Download this white paper to learn more.
Posted: 07 May 2024 | Published: 07 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Endpoint Protection Buyer’s Guide
sponsored by CrowdStrike
WHITE PAPER: Explore the critical capabilities required for modern endpoint protection, including AI-powered prevention, advanced detection and response, identity threat detection, threat intelligence, and managed threat hunting. Download the Endpoint Protection Buyer's Guide to learn how to secure your organization against today's sophisticated threats.
Posted: 13 Jul 2024 | Published: 13 Jul 2024

CrowdStrike

Cloud PAM Buyer’s Guide A No-Fuss, Non-Salesly Tour Of What Matters Most
sponsored by Saviynt
WHITE PAPER: Well-run PAM programs add enterprise-wide visibility and leverage identity intelligence and analytics to help leaders make better access decisions. You’re likely hunting for the right list of questions to ask and concerns to raise en route to this more secure reality. Read this guide to learn more.
Posted: 15 Mar 2024 | Published: 15 Mar 2024

TOPICS:  .NET
Saviynt

5 Must-Have Features in a Marketing Automation Platform
sponsored by Marketo
EGUIDE: Read this comprehensive list of features you should look for before choosing a marketing automation platform. See this breakdown of five key automation areas, with specific clusters of features outlined.
Posted: 08 Feb 2021 | Published: 23 Dec 2016

Marketo

Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Mar 2017

TechTarget ComputerWeekly.com

2024 Assessment Report
sponsored by Bitdefender
RESEARCH CONTENT: Cybersecurity threats are evolving, with AI-powered attacks and cloud security challenges at the forefront. This report examines the state of cloud security, the impact of AI, and the need for proactive, multilayered defense strategies. Download the report to gain insights into navigating these new cybersecurity frontiers.
Posted: 04 Jul 2024 | Published: 04 Jul 2024

Bitdefender

MicroScope – December 2022: Dealing with rising prices
sponsored by MicroScope
EZINE: With prices rising, many are looking at what costs to cut – yet in the channel, the opposite might prove for better business. In this issue, read about how to navigate the cost issue, learn about the growing area of security, and learn about how to create a more appealing employment experience to attract talent
Posted: 01 Dec 2022 | Published: 02 Dec 2022

MicroScope

Akamai Guardicore Segmentation PCI DSS Whitepaper
sponsored by Akamai Technologies
WHITE PAPER: A new assessment from GRSee indicates how Akamai Guardicore Segmentation can help organizations meet, support, or validate 9 of the 12 high-level requirements of Payment Card Industry Data Security Standard (PCI DSS) compliance. Get the third-party validation you need to start your segmentation project.
Posted: 25 Apr 2024 | Published: 25 Apr 2024

TOPICS:  .NET
Akamai Technologies

Data Integration Success Stories Solutions
sponsored by Qlik
EBOOK: Enterprises across industries are streamlining data pipelines with Qlik's Data Integration Platform. In this e-book, you'll learn how companies like Generali, USAA, and Fanatics accelerated data delivery, scaled data volumes, and improved data access. Read the full case studies now to learn how you can overcome top data integration challenges.
Posted: 13 Aug 2024 | Published: 14 Aug 2024

Qlik

African + Eastern Deploys Comprehensive Security Program with Secureworks
sponsored by SecureWorks
CASE STUDY: Middle East beverage distributor African + Eastern deploys comprehensive security program with Secureworks, gaining 24/7 threat monitoring, detection, and response to reduce organizational risk. Read the full case study to learn how Secureworks' managed detection and response solution helped secure their digital environment.
Posted: 14 Nov 2024 | Published: 14 Nov 2024

SecureWorks

CW APAC, October 2021: Tech Career Guide
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks what is being done to close cyber security’s gender gap in the Asia-Pacific region
Posted: 14 Oct 2021 | Published: 14 Oct 2021

TechTarget ComputerWeekly.com

ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT: This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

APAC career guide: Becoming a cyber security pro
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Once the sole domain of highly technical geeks poring over security logs to look for signs of hackers lurking in their networks, cyber security has become more multi-dimensional and varied across specialisations, organisations and industries. In this e-guide, learn what it takes to become a successful cyber security pro in APAC.
Posted: 19 May 2022 | Published: 19 May 2022

TechTarget ComputerWeekly.com

UKtech50 2018: The 50 most influential people in UK IT
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.
Posted: 08 Feb 2021 | Published: 17 Dec 2018

TechTarget ComputerWeekly.com

The Managed Detection And Response Landscape, Q1 2023
sponsored by Bitdefender
FORRESTER RESEARCH REPORT: Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.
Posted: 16 Sep 2023 | Published: 16 Sep 2023

TOPICS:  .NET
Bitdefender

Top 10 IT careers and skills stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Digital skills are becoming increasingly important for day-today living, as well as for navigating the world of work. With digital and technology becoming a part of every company, it is important that all citizens in the UK have at least a basic level of digital competence. Here are Computer Weekly's top 10 IT careers and skills stories of 2019.
Posted: 08 Feb 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

CW Nordics - May-July 2019: Facing up to fintech
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Nordics, we take a look at how one of the Nordic region's big, traditional banks is going about meeting the challenges posed by new digital entrants into the finance sector. And it is another large traditional player, but this time in the IT world, which Nordea is turning to for support– none other than Big Blue.
Posted: 08 Feb 2021 | Published: 03 May 2019

TechTarget ComputerWeekly.com

Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

CISO Success Stories: How security leaders are tackling evolving cyber threats
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
Posted: 18 Jan 2024 | Published: 19 Jan 2024

TechTarget ComputerWeekly.com

Computer Weekly – 16 October 2018: Drilling into AI at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Oct 2018

TechTarget ComputerWeekly.com