Data Capture Reports

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Unlocking value in the railway network's data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Jun 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to retail technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The retail industry is evolving alongside the emergence of new technologies. In this 15-page buyer's guide, Computer Weekly looks at how retailers are using AI, the importance of good digital customer experience and how mobiles have transformed the purchasing process.
Posted: 08 Feb 2021 | Published: 17 Oct 2018

TechTarget ComputerWeekly.com

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
sponsored by TechTarget ComputerWeekly.com
EZINE: Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.
Posted: 08 Feb 2021 | Published: 10 Oct 2019

TechTarget ComputerWeekly.com

Building a Unified Enterprise Mobility Strategy
sponsored by Motorola Solutions
WHITE PAPER: This paper outlines a step-by-step approach to developing a unified enterprise mobility strategy, enabling a more cost-effective and efficient delivery of network connectivity to a larger mobile workforce.
Posted: 29 Jun 2007 | Published: 01 May 2007

Motorola Solutions

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

2006 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
Posted: 28 Dec 2007 | Published: 01 Oct 2006

ISC2