Virus Detection Hardware Reports

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

9 essential elements of network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 08 Feb 2021 | Published: 08 May 2020

TechTarget ComputerWeekly.com

CW@50: March editions of Computer Weekly
sponsored by TechTarget ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 08 Feb 2021 | Published: 15 Mar 2016

TechTarget ComputerWeekly.com

A Computer Weekly Buyers Guide to IoT
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
Posted: 08 Feb 2021 | Published: 12 Jan 2021

TechTarget ComputerWeekly.com

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

The Case For An Accelerated Device Refresh Cycle
sponsored by Dell Technologies and Intel
ANALYST REPORT: Read this Forrester report to examine the case for a faster device refresh cycle, 3 advantages of an accelerated device refresh process (hint: one is security), and 8 benefits realized from a two-year refresh cycle.
Posted: 10 May 2023 | Published: 10 May 2023

TOPICS:  Hardware
Dell Technologies and Intel

What to Include in an SD-WAN Security Checklist
sponsored by TATA Communications
EGUIDE: Ensuring security in a software-defined WAN implementation is crucial, but it's often easier said than done. The SD-WAN security equation comprises multiple variables. In this e-guide, uncover 4 different areas where enterprises should consider SD-WAN and security, as well as the core capabilities to include in an SD-WAN security checklist.
Posted: 10 Nov 2020 | Published: 04 Nov 2020

TATA Communications

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

TechTarget ComputerWeekly.com

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk