AES Reports

ACCELERATING IMPACT: NONPROFITS + SERVICENOW
sponsored by ServiceNow
EBOOK: How can you balance the nuanced IT requirements within your nonprofit while delivering exceptional experiences for customers and employees? Access this e-book to examine the key areas in which ServiceNow supports the organizational and digital transformation goals of nonprofits.
Posted: 07 Jan 2025 | Published: 07 Jan 2025

ServiceNow

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

2025-26 DCIG TOP 5 MODERN SDS BLOCK STORAGE SOLUTIONS
sponsored by StorPool
ANALYST REPORT: This report evaluates 21 modern software-defined storage (SDS) block solutions, identifying the top 5 based on features like data protection, deployment options, and performance management. Read the full report now to learn how these SDS solutions can modernize your storage infrastructure.
Posted: 14 Nov 2024 | Published: 15 Nov 2024

StorPool

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Surviving? Barely! 3 Current Barriers to SDR Success and How to Fix Them
sponsored by Informa TechTarget
INFOGRAPHIC: In this TechTarget infographic, take a look at the 3 leading challenges impacting SDR performance, and how organizations can turn their situation around.
Posted: 09 Mar 2023 | Published: 09 Mar 2023

TOPICS:  .NET
Informa TechTarget

The Buying Team is Missing in Your ABM Strategy
sponsored by Informa TechTarget
TECHTARGET MEDIA: In this new e-book, The Buying Team is Missing in Your ABM Strategy, Josh looks at buying teams and ABM from a technical and marketing operations perspective to share how organizations can build buying teams with ABM, design GTM enterprise workflows to support buying team and much more.
Posted: 02 Dec 2024 | Published: 03 Dec 2024

Informa TechTarget

Fortinet Unified Secure Access Service Edge
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet SASE Solution Earns AAA Rating. CyberRatings.org thoroughly tested FortiSASE to determine how it handled TLS/SSL 1.2 and 1.3 cipher suites, how it defended against 205 exploits and 7,140 malware samples, and whether any of 1,124 evasions could bypass its protection. Read the full report to get all the details.
Posted: 18 Dec 2024 | Published: 04 Dec 2024

TOPICS:  .NET
Fortinet, Inc.

The Frightening Realities of Your SDR Program ... and What to Do About Them
sponsored by Informa TechTarget
EBOOK: To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.
Posted: 03 Dec 2021 | Published: 03 Dec 2021

TOPICS:  .NET
Informa TechTarget

Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018

TechTarget ComputerWeekly.com

A Short, Complete Guide to Intent Data for Sales and Marketing
sponsored by Informa TechTarget
WHITE PAPER: Dive into this TechTarget white paper to learn how you can accelerate your own journey with intent data – whatever stage you’re at.
Posted: 25 Mar 2023 | Published: 25 Mar 2023

TOPICS:  .NET
Informa TechTarget

Spotlight on the Middle East: Emerging IT economy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We focus on how countries in the Middle East region are trying to diversify their economies away from oil revenues. We look at how Saudi Arabia is trying to create their own version of Silicon Valley, how Dubai is trying to incorporate bitcoin into the property sector and how the UAE is trying to harness the power of artificial intelligence.
Posted: 08 Feb 2021 | Published: 29 May 2018

TechTarget ComputerWeekly.com

Spotlight on Benelux: A smart future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at how smart living and working are shaping up to be two of the most important and beneficial aspects of the digital transformations happening in Benelux today. We discover how Dutch towns are planning on using IT to automate human and business activity and how the Port of Rotterdam is preparing for autonomous ships.
Posted: 08 Feb 2021 | Published: 29 May 2018

TechTarget ComputerWeekly.com

Focus: Securing the cloud
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com

Top 10 Middle East stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

Top 10 enterprise IT in the Middle East stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Countries in the Middle East have become pioneers of the latest digital technologies and some of the articles featured by Computer Weekly this year evidence that. Here are Computer Weekly's top 10 enterprise IT in the Middle East stories of 2019.
Posted: 08 Feb 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform
sponsored by CyberArk
WHITE PAPER: Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.
Posted: 23 Aug 2024 | Published: 23 Aug 2024

TOPICS:  .NET
CyberArk

Intent-Guided Multithreading Tactics That Work
sponsored by Informa TechTarget
TECHTARGET MEDIA: As buyers become more digital, sellers must evolve their tactics. This white paper explores using intent-guided multithreading to identify and engage buying teams earlier, accelerate opportunities, and deliver high-value meetings that drive pipeline. Read the full white paper to learn more.
Posted: 04 Sep 2024 | Published: 05 Sep 2024

Informa TechTarget

Infographic: Comparing cloud database security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: More data than ever before is being put into cloud-based storage repositories. Leading cloud providers offer an array of storage options, yet databases remain the most common choice in today's enterprises. Because databases are updated so frequently, it's important to review their security controls regularly.
Posted: 03 Nov 2021 | Published: 03 Nov 2021

TechTarget ComputerWeekly.com

5 Advanced Security Features of Azure Virtual Desktop for Enterprise Protection
sponsored by Big Green IT
PRODUCT OVERVIEW: Azure Virtual Desktop offers advanced security features to protect sensitive data and ensure regulatory compliance for remote work. Learn about identity management, network security, data encryption, and threat protection in this in-depth white paper.
Posted: 17 Jan 2025 | Published: 18 Jan 2025

Big Green IT

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Unlocking the CFO’s Support
sponsored by GEM
WHITE PAPER: To secure a recruiting CRM, show your CFO how it solves critical hiring challenges and delivers ROI through cost savings. Download this guide to build a CFO-proof business case for your recruiting CRM.
Posted: 12 Jun 2024 | Published: 20 Jun 2024

GEM

Nexthink + AWS for Technology Organizations
sponsored by Nexthink & AWS
PRODUCT OVERVIEW: Nexthink and AWS offer a powerful solution to help technology companies enhance the digital employee experience, increase proactive IT management, and reduce costs. Learn how this joint solution can transform your technology operations by reading the full Product Overview.
Posted: 27 Dec 2024 | Published: 28 Dec 2024

Nexthink & AWS

CIO Trends #11: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
Posted: 08 Feb 2021 | Published: 04 Jan 2021

TechTarget ComputerWeekly.com

CIO Trends #11: Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
Posted: 08 Feb 2021 | Published: 02 Jul 2020

TechTarget ComputerWeekly.com

Demo a ChromeOS Device With Insight
sponsored by Insight
PRODUCT OVERVIEW: Insight's expertise with ChromeOS solutions can help modernize your workforce. Secure devices, easy management, and cost savings make ChromeOS an ideal choice. Request a demo to experience the benefits firsthand.
Posted: 14 Jun 2024 | Published: 20 Jun 2024

Insight