Virus Detection Hardware Reports

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Converged infrastructure in 2021: Next-generation datacentre designs
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Simplifying the deployment and management of datacentre hardware systems is one of the main draws of converged and hyper-converged infrastructure setups for enterprises.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TechTarget ComputerWeekly.com

CW@50 - What was making the news in May
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 08 Feb 2021 | Published: 09 May 2016

TechTarget ComputerWeekly.com

Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
Posted: 08 Feb 2021 | Published: 05 Aug 2016

TechTarget ComputerWeekly.com

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jan 2018

TechTarget ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

George Crump Evaluates the State of Flash Storage Systems
sponsored by HPE and Intel®
EGUIDE: In this expert guide, George Crump outlines the state of flash storage systems, and demonstrates how to use NVMe and flash DIMM to proactively keep performance ahead of users' expectations. Read on as Crump also predicts the fate of HDDs, and explains how to keep pace by improving internal and external connectivity.
Posted: 21 Jun 2017 | Published: 09 Jun 2017

HPE and Intel®

Top 10 IT security stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

TechTarget ComputerWeekly.com

How virtual desktops simply end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com