ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • 2024 IT Salaries and Careers Survey APAC

    Sponsored by: TechTarget

    TechTarget's IT Career & Salaries Study is designed to determine major trends in employment, salaries, perks, and staffing, in order to understand the tech landscape from the viewpoint that matters most; yours. As a valued member of the TechTarget network, we've selected you as a priority candidate, and need your response as soon possible.

  • Passalacqua hotel claims exceptional guest connectivity with AI-driven Wi-Fi 7

    Sponsored by: RUCKUS Networks

    Italy’s Passalacqua was constructed in the 18th century; today, it’s a hotel. Over the past few centuries, the needs of Passalacqua’s visitors have certainly changed. For instance, in 2024, guests expect seamless and secure wireless connectivity. So, how does Passalacqua deliver? Find out in this E-Guide.

  • Expert Industrial Cybersecurity Training for Severstal Employees

    Sponsored by: Kaspersky

    Severstal, a global steel company, adopted Kaspersky's industrial cybersecurity to secure its production systems. The training and solutions enhanced protection and enabled faster incident response. Read this Case Study to learn how Kaspersky's portfolio strengthened operational resilience at Severstal's plants.

  • South Australian Utility Expands CrowdStrike Protections to Bolster Defence and Address Cybersecurity Skills Shortage

    Sponsored by: CrowdStrike

    SA Power Networks is South Australia’s sole electricity distributor. With escalating threats targeting critical infrastructure, SA Power Networks had to reckon with a new level of danger. Download this case study to learn how SA Power Networks uses the CrowdStrike Falcon platform for endpoint detection and response (EDR).

  • Innovative HR Solutions Provider BIPO Strengthens Security Posture and Bolsters Portfolio of World-class Partners

    Sponsored by: CrowdStrike

    PO is an HR services provider with an extensive network of offices located in key gateway cities across the APAC region. As their operation has increased, so too has the scale of sensitive information and data that they need to safeguard. Unlock the case study to learn how CrowdStrike helps BIPO protect customer data.

  • Australian Utility Provider Partners With CrowdStrike to Transform Cybersecurity Defense and Critical Infrastructure Protection

    Sponsored by: CrowdStrike

    With Australia on the cusp of introducing new cybersecurity regulations, Jemena realized their security systems were still vulnerable in a number of critical areas, and decided they needed a new partner to help. Download the case study to learn how Jemena uses CrowdStrike Falcon Complete for 24/7 managed endpoint detection and response.

  • Spotlight: Philippines

    Sponsored by: Cloudflare

    Cloudflare recently conducted a study with over 4,000 cybersecurity decision makers across 14 different markets, with the aim of understanding security challenges as they exist across a number of regions. Download this regional spotlight to unlock the findings of Cloudflare’s study, as well as 5 key data-driven recommendations.

  • Spotlight: Singapore

    Sponsored by: Cloudflare

    Singapore cybersecurity CISOs highlight the following as the 3 most difficult security challenges they face: Securing a hybrid workforce, defending against cyberattacks, and deploying zero trust. Download this report for a comprehensive overview of the state of cybersecurity in Singapore.

  • Executive Briefing Telco To Techco: Six Tenets For Success

    Sponsored by: Red Hat and Intel

    To thrive amid disruption from internet giants, telcos must evolve. Read the full report for specific strategies across network and non-network domains that incumbents can implement on their journey to become next-gen techcos.

  • A Cloud Workload Protection Platform Buyers Guide

    Sponsored by: SentinelOne

    89% of organizations consider effective cloud threat detection and response to be critical, according to a recent survey by TechTarget’s Enterprise Strategy Group (ESG). One way to boost threat detection and response for your cloud environment is to leverage a cloud workload protection platform (CWPP). Continue on to access a CWPP buyer’s guide.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.