Environment Protection Agency Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Siperian, Inc.

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Into the Future: The Fast Track for Financial Markets
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how high performance computing solutions from IBM can enable high-velocity financial analytics and trading.
Posted: 17 Jun 2008 | Published: 01 Sep 2007

IBM Line of Business

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

CW ANZ, November 2018: Exploring blockchain
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

ecuring Civilian Agencies Next-Gen SIEM for Enhanced Protection
sponsored by CrowdStrike
WEBCAST: Civilian organizations are increasingly being exposed to advanced threats. In this webcast, experts from CrowdStrike break down their mission to secure civilian agencies with next-gen SIEM for enhanced protection. Watch the webcast now to learn more about Falcon Next-Gen SIEM.
Posted: 23 Oct 2024 | Premiered: Oct 23, 2024

TOPICS:  .NET
CrowdStrike

Sustainable environment
sponsored by Fujitsu
EBOOK: Fujitsu believes that the key to closing the sustainability gap is Sustainability Transformation through digital innovation. But what exactly does this mean? Download this e-book to find out.
Posted: 02 Feb 2024 | Published: 02 Feb 2024

TOPICS:  .NET
Fujitsu

Securing Virtualized Environments: The Imperative of Preemptive Protection
sponsored by Centripetal Networks
WHITE PAPER: Virtualized environments face unique security challenges due to vulnerabilities in VDI and virtual server technologies. This white paper explores how intelligence-powered cybersecurity can deliver preemptive protection against exploits, reducing the risk of damaging breaches during the patching window. Read the full white paper to learn more.
Posted: 11 Jun 2024 | Published: 11 Jun 2024

Centripetal Networks

Build Your Agency’s Next Breakthrough
sponsored by FCN
WHITE PAPER: Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
Posted: 18 Jul 2023 | Published: 18 Jul 2023

TOPICS:  .NET
FCN

Digital And Hybrid Event Platform In An ISO-Certified AWS Environment
sponsored by AllCloud
CASE STUDY: VOK DAMS, an international communications agency for events and live marketing, needed a way to create a platform for hosting hybrid events with both digital and in-person participants. Check out this brief case study to explore the benefits of working with AWS and AllCloud to build a foundation for your business innovation needs.
Posted: 27 Jan 2022 | Published: 27 Jan 2022

TOPICS:  .NET
AllCloud

A Practical Guide to Zero Trust Implementation in Multicloud Environments
sponsored by PC Connection
EBOOK: Explore a practical guide to implementing a Zero Trust architecture in multicloud environments. Learn how to progress your Zero Trust maturity, select the right technologies, and work with a trusted partner. Read the full e-book to secure your modern IT ecosystem.
Posted: 19 Sep 2024 | Published: 20 Sep 2024

All resources sponsored by PC Connection

Embracing The Future: Leveraging AI For Federal Agencies
sponsored by FCN
WHITE PAPER: This white paper explores how federal agencies can leverage AI to drive innovation, enhance productivity, and improve citizen services. Learn about the benefits of AI, the challenges agencies face, and strategies for successful AI implementation. Discover how Dell Technologies and FCN, Inc. can guide your agency's AI journey.
Posted: 12 Nov 2024 | Published: 13 Nov 2024

FCN

Anything is Possible with the Right Data Foundation
sponsored by Hitachi Vantara
EBOOK: Federal agencies have massive amounts of data, but struggle to fully leverage it. Upgrading data storage infrastructure, investing in analytics tools, and enhancing security can help unlock the full potential of your data. Read the e-book to learn how the VSP One platform from Hitachi Vantara Federal can transform your data foundation.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Hitachi Vantara

Arctic Wolf Protects Breadth and Depth of Club’s Vast IT Environment
sponsored by Arctic Wolf
CASE STUDY: Composing the Parramatta Leagues Club (PLC) are the Parra Leagues and the Parramatta Eels, a community club and a professional rugby league football club, respectively. So, how does the PLC secure its vast IT environment? Find out in this case study.
Posted: 22 Mar 2024 | Published: 22 Mar 2024

TOPICS:  .NET
Arctic Wolf

Defense Agency Dramatically Shrinks Data Center Footprint
sponsored by Hitachi Vantara
CASE STUDY: A defense agency dramatically reduced its data center footprint by 25% through storage virtualization and infrastructure modernization with Hitachi Vantara. The solution delivered major benefits in cost, resiliency, and performance. Read the full case study to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Hitachi Vantara

Modern Data Storage: The Backbone of Government Innovation
sponsored by Hitachi Vantara
WHITE PAPER: As data growth accelerates, government agencies must leverage modern data storage to drive innovation and achieve mission objectives. This issue brief explores how Hitachi Vantara's storage solutions can provide the performance, reliability, agility, and security agencies need. Read the full brief to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Hitachi Vantara

Secure Software Development Environments
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure software development environments are critical to prevent supply chain attacks. This solution brief outlines how Zentera's CoIP Platform can help organizations achieve NIST SP800-218 compliance while maintaining developer productivity through a zero trust architecture. Read the full solution brief to learn more.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Build and Operate Secure Containerized Environments at Scale
sponsored by Amazon Web Services
EBOOK: Learn how to build and operate secure containerized environments at scale. This eBook explores best practices for maximizing the benefits of containers while minimizing security risks. Get expert guidance on protecting your containerized applications and workloads.
Posted: 30 Oct 2024 | Published: 31 Oct 2024

Amazon Web Services

CW ANZ: Australian firms connect people in new ways
sponsored by TechTarget ComputerWeekly.com
EZINE: Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

Identity Protection for the SOC
sponsored by TD Synnex
WEBCAST: For security teams, their legacy identity management solutions are no longer suited for securing today’s environments. Combining 2 distinct identity security technologies, IBM Verify Identity Protection presents an approach to identity security that is designed to meet today’s threats. Watch this webcast to learn more about the emerging solution.
Posted: 20 Aug 2024 | Premiered: Aug 21, 2024

TOPICS:  .NET
TD Synnex

The complex environment facing financial services
sponsored by Tanium
RESEARCH CONTENT: Today, banks and insurers sell through digital channels while their customers interact digitally as well. As a result, financial services companies are the target of frequent and severe cyberattacks. In this report, learn about the scope and scale of the threat landscape and what this sector can do to gain visibility into their IT environments.
Posted: 09 Aug 2023 | Published: 09 Aug 2023

TOPICS:  .NET
Tanium

The Evolution of Ecommerce
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: PH
Posted: 03 Feb 2022 | Published: 03 Feb 2022

LexisNexis® Risk Solutions

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com

Accelerating Zero Trust Capabilities
sponsored by Saviynt
EBOOK: The rapid growth of adversarial cyber threats emphasizes the need for the Department of Defense (DoD) to adapt and improve our deterrence strategies and cybersecurity implementations. In this whitepaper, Saviynt will hone in on the three specific pillars that require agencies to protect users, systems, and data at the identity layer.
Posted: 30 Apr 2024 | Published: 30 Apr 2024

TOPICS:  .NET
Saviynt

Sustainable End User Computing: Lower costs, protect the environment, gain a competitive edge
sponsored by Unicon GmbH
WHITE PAPER: Sustainable end-user computing is crucial for reducing costs, protecting the environment, and gaining a competitive edge. Learn how VDI, energy-efficient devices, and extended device lifecycles can drive sustainability in this white paper.
Posted: 27 Aug 2024 | Published: 28 Aug 2024

All resources sponsored by Unicon GmbH

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

Cloudflare One for Data Protection
sponsored by Cloudflare
PRODUCT OVERVIEW: Data occupies an increasingly important and complex role in the way modern organizations run, but as a result, it has become a primary focus for attackers. Cloudflare One’s data protection suite is built to stay at the forefront of these distinctly modern risks. Download this product overview to learn more.
Posted: 02 Feb 2024 | Published: 03 Feb 2024

TOPICS:  .NET
Cloudflare

Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017

TechTarget ComputerWeekly.com

Protect Against the OWASP Top 10
sponsored by F5 Inc.
EBOOK: The OWASP Top 10 outlines the most serious risks to web applications, with broken access control now the top threat. Learn how to mitigate these risks and protect your applications with F5 Distributed Cloud Web App and API Protection. Read the full e-book for comprehensive insights.
Posted: 04 Sep 2024 | Published: 05 Sep 2024

F5 Inc.