URL Reports

Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.
Posted: 02 Dec 2022 | Published: 06 Dec 2022

TechTarget ComputerWeekly.com

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Migration to DOCSIS 3.0
sponsored by Motorola Solutions
WHITE PAPER: Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola Solutions

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019

TechTarget ComputerWeekly.com

Security Products for Protection: Endpoint and Anti-Malware
sponsored by Carbon Black
EGUIDE: Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
Posted: 08 Feb 2021 | Published: 21 Aug 2017

Carbon Black

A-core Fortifies Cybersecurity
sponsored by Bitdefender
CASE STUDY: After a close call with a ransomware attack, A-Core Concrete Specialists’ IT team decided they needed a more prepared and mature endpoint and email security operation. By partnering with Bitdefender, A-Core were able to combine several of their offerings and create a more secure operation while saving time and energy. Read on to learn more.
Posted: 10 Feb 2023 | Published: 11 Feb 2023

TOPICS:  .NET
Bitdefender

Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017

TechTarget ComputerWeekly.com

Enhancing Microsoft Security with Fortra Email Security
sponsored by Fortra
WHITE PAPER: Enhance email security with Fortra's integrated cloud solution. Learn how to protect against advanced threats like phishing and data loss, while complementing your existing Microsoft 365 platform. Read the full white paper to discover Fortra's comprehensive email security approach.
Posted: 07 Dec 2024 | Published: 07 Dec 2024

Fortra

The Secure Coding Handbook
sponsored by Veracode
EBOOK: This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023

TOPICS:  .NET
Veracode

Hacking the Human Operating System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com

Secure Email - Market Quadrant 2024
sponsored by Fortra
ANALYST REPORT: The Radicati Secure Email Market Quadrant 2024 evaluates leading vendors in the secure email market, including Proofpoint, Mimecast, Symantec, Cisco, and more. Learn how these vendors protect against email threats like phishing, BEC, and malware. Read the full report for a comprehensive analysis.
Posted: 07 Dec 2024 | Published: 07 Dec 2024

Fortra

Automated Threat Analysis
sponsored by Splunk
EBOOK: Phishing and malware threats have become a huge concern for businesses both big and small. These threat types continue to evolve at an alarming rate, leveraging advanced techniques in order to bypass traditional security measures. Access this guide to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

Splunk

Effectively leveraging cloud-based contracts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cloud contracts offer great benefits, but they can put organisations at significantly greater risk than conventional IT service contracts. This report by consultant Bob Fawthrop explains how to mitigate the risks.
Posted: 08 Feb 2021 | Published: 18 Jan 2017

TechTarget ComputerWeekly.com

SonicWall Next-Generation Firewall Buyer’s Guide
sponsored by SonicWall
BUYER'S GUIDE: As enterprises embrace cloud, remote work, and new threats, next-generation firewalls (NGFWs) must evolve to provide robust security controls, performance, and management. Evaluate NGFW features like sandboxing, multi-instance, and threat intelligence to find the right fit for your network. Read the full Buyer's Guide to learn more.
Posted: 17 Dec 2024 | Published: 18 Dec 2024

SonicWall

Payroll legislation: how ADP takes the stress out of compliance (IN)
sponsored by ADP
EBOOK: Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024

TOPICS:  .NET
ADP

Payroll legislation: how ADP takes the stress out of compliance (AU)
sponsored by ADP
EBOOK: Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024

TOPICS:  .NET
ADP

Payroll legislation: how ADP takes the stress out of compliance (HK)
sponsored by ADP
EBOOK: Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024

TOPICS:  .NET
ADP

Payroll legislation: how ADP takes the stress out of compliance (PH)
sponsored by ADP
EBOOK: Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024

TOPICS:  .NET
ADP

Payroll legislation: how ADP takes the stress out of compliance (SG)
sponsored by ADP
EBOOK: Today’s financial and HR leaders expect challenges when it comes to compliance, especially when expanding into new markets. However, few have sufficient guidance for entering these new landscapes. Browse this guide to learn more.
Posted: 02 Feb 2024 | Published: 02 Feb 2024

TOPICS:  .NET
ADP

2024 Miercom Security Benchmark Compare the Top Enterprise Firewalls
sponsored by Checkpoint Software Technologies
INFOGRAPHIC: With such a narrow margin between defense and disaster, you need to make sure you have the most effective and functional firewall possible. This infographic presents the 2024 Miercom Security Benchmark for top enterprise firewalls, which uses attack-time metrics to compare the leading vendors. Download now to learn more.
Posted: 10 May 2024 | Published: 10 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018

TechTarget ComputerWeekly.com

Obtaining Best-in-Class Network Security with Cloud Ease of Use
sponsored by Palo Alto Networks
PRODUCT OVERVIEW: Secure your cloud workloads with Palo Alto Networks' Cloud NGFW for AWS. This fully managed cloud-native service provides best-in-class network security with easy deployment and zero maintenance. Learn how Cloud NGFW can safeguard your AWS environment.
Posted: 05 Nov 2024 | Published: 06 Nov 2024

Palo Alto Networks

Unify Detection and Response across Your Entire Network with FortiEDR, FortiNDR Cloud, and FortiGate NGFW
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: Unify network and endpoint security with FortiEDR, FortiNDR Cloud, and FortiGate NGFW. Gain enriched detections, streamlined investigations, and faster response to stop threats across your environment. Read the white paper to learn more.
Posted: 07 Oct 2024 | Published: 08 Oct 2024

Fortinet, Inc.

The sped-up deployment of IoT on the back of "failure free" 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Research in November 2021 from Inmarsat Enterprise found that as many as 84% of businesses gave sped up deployment of IoT, or plan to, because of Covid.  In this guide, learn how businesses implementing IoT technologies are getting ahead of the competition across their value chains.
Posted: 10 Dec 2021 | Published: 10 Dec 2021

TechTarget ComputerWeekly.com

Secure Connectivity for Devices and Users at the Network Edge
sponsored by Ericsson
EBOOK: Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
Ericsson

Getting Started with Zero Trust Access Management
sponsored by Okta
EBOOK: For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TOPICS:  .NET
Okta

Bitdefender Penetration Testing Services
sponsored by Bitdefender
WHITE PAPER: Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.
Posted: 10 Feb 2024 | Published: 10 Feb 2024

TOPICS:  .NET
Bitdefender