• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Cloud Computing
flow-image
Tintri

The Role of Machine Learning and Automation in Storage

There has been lots of hype around the increasing role that machine learning, and artificial intelligence more broadly, will play in how we automate the management of IT systems. Whether it's labelled as Intelligent Infrastructure , AIOps, “self-driving IT”, or even private cloud, the aim is the same: to...

Published: Dec 22, 2020
View More
flow-image
syslog-ng

NIST Cybersecurity Framework

The document gives you an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure. This document is recommended for C-level executives and security specialists who work on adopting technologies...

Published: Feb 18, 2021
View More
flow-image
One Identity

Securely Managing Your UNIX Environment

With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems—with Microsoft Windows at the forefront—Unix-based organizations face many identity and access management (IAM) challenges. This white paper...

Published: Feb 19, 2021
View More
flow-image
syslog-ng

Five things every business needs to know about GDPR

After years of preparation and drafting, the final t’s were crossed and i’s dotted on the General Data Protection Regulation (GDPR), when the Council of the European Union and the European Parliament adopted it. It means that it’s time to stop thinking about GDPR and to start acting. Particularly as they...

Published: Feb 18, 2021
View More
flow-image
Xerox

The Future Is Flexible: Six Areas to Make It Work.

Over 50% of businesses are preparing for long-term, flexible work patterns. But the rush to adopt remote technology and maintain service levels has left businesses unable to secure operational resilience. This Xerox guide explores how cloud infrastructure, security, automation, and managed support can futureproof...

Published: Feb 24, 2021
View More
flow-image
Okta

Transform the Customer Experience with a Modern Customer Identity and Access Management (CIAM) Solution

Every company today is becoming a technology company as it digitally transforms its customer experiences. With an explosion of devices, rapidly evolving customer requirements, and higher customer expectations for security and privacy, companies who want to succeed must find ways to ensure their customers can engage with...

Published: Feb 05, 2021
View More
flow-image
Imperva

The State of Security within eCommerce

2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase in online retail business. Throughout the year, Imperva Research Labs monitored traffic to e-commerce sites that exceeded the peaks typically seen in the holiday shopping season. However, as the volume of online...

Published: Feb 08, 2021
View More
flow-image
Veritas

A UK Public Sector Databerg Report

This UK Public Sector Databerg report surveyed senior Public Sector decision makers on the data challenges and issues they face. It highlights, for the first time, the degree of understanding their growing data estates now need to meet strict information governance and security requirements. 

Published: Dec 22, 2020
View More
flow-image
Imperva

15 Ways Your Website is Under Attack

Web applications are the home of your business on the internet. The functionality within your website, the structure of your technology stack, and the code used to build it are under constant attack from bad actors attempting to compromise your business. Understanding these types of attacks will help you prevent fraud,...

Published: Feb 08, 2021
View More
flow-image
Behavox

HOW TO CREATE A MODERN COMPLIANCE PROGRAM

The year of 2020 changed compliance forever. When investment professionals started to work from home, across an expanded and decentralized risk map, compliance teams quickly discovered they were ill-equipped to aggregate and analyze the thousands of emails, chat messages, texts and hours of phone calls that traders...

Published: Feb 03, 2021
View More
flow-image
Malwarebytes

Enduring from Home: COVID-19’s Impact on Business Security

Faced with shelter-in-place orders in their home counties and states, countless companies transitioned to entirely remote workforces. Predictably, these near-immediate transitions carried with them some setbacks. A remote workforce can become a workforce stretched thin: Communication must adapt to online models...

Published: Feb 04, 2021
View More
flow-image
Xerox

Three Steps To Put Your Processes On Autopilot

Minimizing time spent on repetitive manual tasks is key to staying ahead for many businesses. Over the past two years, businesses that automated their workflows saw their revenue grow by 15%. That’s twice the speed of those who didn’t. And with this trend expected to accelerate, it’s something a lot of...

Published: Feb 24, 2021
View More
flow-image
Tintri

Tintri Introduces SQL Integrated Storage

What is SQL Integrated Storage? A SQL database is, essentially, a collection of files with associated metadata, managed by a relational database management system. SQL integrated storage provides similar capabilities to SQL databases, from a storage context, as VMware integrated storage does...

Published: Dec 22, 2020
View More
flow-image
Egnyte

Tackling Content Sprawl with Governance Designed to Support Remote Work

In the heart of central London is a workplace specialist built withsomething different. While the historic Old Bailey Court and St. Paul’s Cathedral are visible from their office windows, BW: Workplace Experts is a company that is boldly shaping the future of its sector. Founded in 2000, BW: Workplace Experts...

Published: Feb 02, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x