• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Desktop/Laptop OS
flow-image
Egnyte

Managing Sprawl in Microsoft 365

How content sprawl happens, why it matters, and steps every IT leader should take to avoid it. Sprawl happens when anyone and everyone can create a site or team, usually without oversight, planning, or any kind of formal training, resulting in dozens/hundreds of rarely used or abandoned sites and teams, a poorly-performing...

Published: Jan 18, 2021
View More
flow-image
Xerox

The Future Is Flexible: Six Areas to Make It Work.

Over 50% of businesses are preparing for long-term, flexible work patterns. But the rush to adopt remote technology and maintain service levels has left businesses unable to secure operational resilience. This Xerox guide explores how cloud infrastructure, security, automation, and managed support can futureproof...

Published: Feb 24, 2021
View More
flow-image
Aruba

IT’s 5 Toughest Work from Home Challenges

All of a sudden, you (and everyone else) found yourself working from home (WFH). The one advantage was the lack of a soul-crushing commute. Unfortunately, many of your co-workers had never really signed in from home, so help desk calls reached an all-time high. Questions ranged from how to access protected files, to whether...

Published: Feb 09, 2021
View More
flow-image
Imperva

14 Questions to Ask Your Application Security Vendor

When evaluating application security vendors, you have a great deal to consider. Understanding your goals will help. If your goal is vendor consolidation then selecting those offering multiple security capabilities over single products may make more sense. If your goal is out-of-the-box functionality then understanding...

Published: Feb 08, 2021
View More
flow-image
One Identity

IT Services Firm Enhances UNIX Security While Simplifying Management

Read how an IT services firm enhances UNIX security while simplifying management.

Published: Feb 19, 2021
View More
flow-image
syslog-ng

End-point Log management

Deploying a robust log management solution on end-points can be challenging. Monitoring remote end-points introduces more complexity to log management as remote connections can be unreliable, lack bandwidth and are often insecure. Most log collection tools and agents shipped with SIEMs lack the ability to ensure the confidentiality...

Published: Feb 18, 2021
View More
flow-image
Malwarebytes

2021 State of Malware Report

The story of 2020 is of the devastating COVID-19 pandemic, and of how the world adapted. The story of malware in 2020 then, is a story of how the tools and tactics of cybercrime and cybersecurity changed against a backdrop of enormous changes to ordinary life. As entire businesses switched to remote working, IT teams...

Published: Feb 24, 2021
View More
flow-image
Okta

Silver linings from 2020, for the future of work

The metaphorical storm clouds that 2020 brought, undoubtedly contain business-critical silver linings. These will affect the way we all work going forwards in a positive manner. That was the general consensus from five leading technology directors who recently participated in the Okta-sponsored Hot Topics series: “Dynamic...

Published: Feb 05, 2021
View More
flow-image
Dell Technologies & Intel

The Future Of Enterprise Computing Starts Now

Gone are the days when IT operated in a dark, back-office environment, where they had little to no impact on the business or the employees they serve. IT leaders now see themselves as fundamental pillars of the business, moving from simple IT operation to the more complex IT orchestration, where they are actively serving...

Published: Nov 03, 2020
View More
flow-image
One Identity

The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution

Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users, but with other platforms such as Unix, Linux, and Mac OS X providing critical services as well. But each of these systems has its own identity, authentication, and access requirements....

Published: Feb 19, 2021
View More
flow-image
syslog-ng

Use Case - Optimizing SIEM

Security Information and Event Management (SIEM) solutions form the core of many organizations’ security strategy, but SIEMs can be expensive, eat up storage and get overwhelmed by the amount and number of formats of log data that they need to process. But there is a way to optimize the performance of your SIEM...

Published: Feb 18, 2021
View More
flow-image
Dell Technologies & Intel Xeon Platinum

Dell EMC PowerStore: Oracle Database Best Practices

This paper delivers guidance for using Dell EMC TM PowerStore TM T model arrays in an Oracle ® 12cR2 (and later versions) Oracle Standalone environment. The document also includes guidance for the Real Application Clusters (RAC) database environment on Linux ® operating systems.  Learn more about...

Published: Jan 26, 2021
View More
flow-image
Okta

IDaaS for Dummies

This book consists of five chapters that explore:  The importance of identity, what it is, and how it has evolved (Chapter 1)  What modern identity (Identity as a Service) is and how it helps organizations address identity challenges and different use cases (Chapter 2)  The components of...

Published: Feb 05, 2021
View More
flow-image
One Identity

Securely Managing Your UNIX Environment

With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems—with Microsoft Windows at the forefront—Unix-based organizations face many identity and access management (IAM) challenges. This white paper...

Published: Feb 19, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x