ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • IT Security for SMEs

    Sponsored by: Fasthosts

    To learn about 6 IT security threats targeting small and medium-sized enterprises (SMEs), download this infographic.

  • Case study: How ProActive's personal service supports SME success

    Sponsored by: Fasthosts

    To discover how small and medium enterprises (SMEs) can improve their network management, check out this episode of Fasthosts ProActive’s podcast “Spill the IT.”

  • Qualitest Helps Leading Apparel Retailer Achieve a Ten-fold Increase in Customer Satisfaction

    Sponsored by: Qualitest Group

    This retailer’s 140-year history is built on the strength of their brands, their team and their strong commitment to drive fashion forward for good. Customer satisfaction is at the heart of these principles. Download this case study to see how Qualitest helped this retailer achieve a ten-fold increase in customer satisfaction.

  • Why the Zero-Click Attack on Outlook Is a Game-Changer for Email Security

    Sponsored by: Checkpoint Software Technologies

    In March, Microsoft disclosed the CVE-2023- 23307 vulnerability, a threat impacting Outlook with a 9.8 CVSS Rating. Download this white paper to see how Checkpoint’s Harmony Email & Collaboration (HEC) API can prevent malicious emails from reaching the inbox.

  • Analyzing the Economic Benefits of Splunk Security

    Sponsored by: Splunk

    According to Enterprise Strategy Group (ESG) research, 52% of respondents believe that security operations are more difficult today than they were two years ago. Cyberthreats have evolved and complex workflows result in limited visibility into the attack surface. Analyze the economic benefits of a unified security platform with this ESG report.

  • 2024 Miercom Security Benchmark Compare the Top Enterprise Firewalls

    Sponsored by: Checkpoint Software Technologies

    With such a narrow margin between defense and disaster, you need to make sure you have the most effective and functional firewall possible. This infographic presents the 2024 Miercom Security Benchmark for top enterprise firewalls, which uses attack-time metrics to compare the leading vendors. Download now to learn more.

  • The Business Value of Red Hat Ansible Automation Platform

    Sponsored by: Red Hat

    In this IDC report, you will learn about the business benefits of using Red Hat’s Ansible automation solution. Highlights from the report include:$8.54 million higher revenue per organization per year36% development team productivity gainsRead the full, 30-page report to explore the ROI you could receive from using Ansible.

  • Surviving Ransomware— What You Need to Know

    Sponsored by: Palo Alto Networks

    Many have heard about the high-profile hits on Colonial Pipeline and JBS Foods, but ransomware attacks are erupting into a seemingly endless parade of compromises in numerous sectors. Download this eBook for a reference point to understand the basics of ransomware, common attack methods, and best practices in the unfortunate event of an attack.

  • The CISO Guide to Ransomware Prevention

    Sponsored by: Checkpoint Software Technologies

    Over the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.

  • What’s your hybrid cloud strategy—data-first or cloud-first?

    Sponsored by: Hewlett Packard Enterprise

    Businesses must choose between a "cloud-first" strategy, emphasizing moving applications to the cloud, and a "data-first" approach, focusing on using data to enhance business outcomes. This report delves into both strategies and their integration. Read the report.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.