• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Storage
flow-image
syslog-ng

Use Case - Compliance

IT departments increasingly find themselves spending ever more resources on compliance as laws, regulations, and industry standards mandate increasing security awareness and the protection of sensitive data. Some requirements such as the Payment Card Industry Data Security Standard (PCIDSS) contain specific data handling...

Published: Feb 18, 2021
View More
flow-image
Veritas

How to Ensure Flexibility in a Hybrid Multicloud Strategy

Enterprises are moving rapidly to diverse cloud models, including hybrid cloud, multicloud and connected cloud networks called interclouds. Implementing a hybrid multicloud with efficiency and effectiveness can be a major undertaking, particularly for established enterprises with decades of stored data, old applications,...

Published: Dec 22, 2020
View More
flow-image
Veritas

Four Ransomware Resiliency Challenges You Can Combat with Confidence

Ransomware is a growing thread to operational resiliency in all digital enterprises. These four stories describe typical challenges administrators may encounter, how they can lead to ransomware mistakes and how organizations might prevent these attacks. Download now.

Published: Dec 22, 2020
View More
flow-image
F5 Networks

Securing Your 5G Edge

As service providers transition to 5G, it’s important that they secure every aspect of their network. Learn the approaches you need to secure your 5G network, starting with the edge.  Protect APIs, secure IoT devices and applications, and mitigate DDoS attacks with F5.

Published: Feb 25, 2021
View More
flow-image
Egnyte

Managing Sprawl in Microsoft 365

How content sprawl happens, why it matters, and steps every IT leader should take to avoid it. Sprawl happens when anyone and everyone can create a site or team, usually without oversight, planning, or any kind of formal training, resulting in dozens/hundreds of rarely used or abandoned sites and teams, a poorly-performing...

Published: Jan 18, 2021
View More
flow-image
Okta

The New Workplace: Re-imagining work after 2020.

The COVID-19 pandemic has forced millions of people around the globe to stay in their homes. As a result, more employees than ever are working remotely. To some, this new way of working comes as a welcome relief; no more commuting, no more distractions and a noticeably improved work-life balance. For others, however, this...

Published: Feb 05, 2021
View More
flow-image
Veritas

Data Management in a Multi-Cloud World: Finance and Insurance Edition

This report focuses on a recent quantitative research study conducted with UK and Ireland IT decision makers (ITDMs). It explores how finance and insurance organisations are approaching cloud adoption, where the key challenges and apprehensions exist, and how organisations can look to overcome these challenges through...

Published: Dec 22, 2020
View More
flow-image
F5 Networks

Fast Track to the 5G Edge

As more service providers move toward 5G, they need a scalable, secure, cloud-native infrastructure that they, and their customers, can rely on. The standalone 5G Core eliminates the hardware-centric, centralized architectures of the past and embraces a cloud-native, distributed infrastructure for building and operating...

Published: Feb 25, 2021
View More
flow-image
syslog-ng

NIST Cybersecurity Framework

The document gives you an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure. This document is recommended for C-level executives and security specialists who work on adopting technologies...

Published: Feb 18, 2021
View More
flow-image
Egnyte

Decrease Downtime and Increase Efficiency, Collaboration and Profitability

Across the State of Qatar – in football stadia and landmark buildings, on highways and critical infrastructure sites, and in Plant Machinery and Vehicle (PMV) facilities – hundreds of employees are sharing thousands of documents. All to ensure that AlJaber Engineeringv’s (JEC) multi-million dollar construction...

Published: Feb 02, 2021
View More
flow-image
Dell Technologies & Intel Corporate

Dell EMC Storage for Microsoft SQL Server

Microsoft SQL Server environments span many versions in a typical data center, running both traditional and modern workloads. Elevate the overall availability, performance, security, data protection, and agility of all Microsoft SQL Server versions—all while reducing the overall datacenter footprint.  ...

Published: Jan 26, 2021
View More
flow-image
Veritas

A UK Public Sector Databerg Report

This UK Public Sector Databerg report surveyed senior Public Sector decision makers on the data challenges and issues they face. It highlights, for the first time, the degree of understanding their growing data estates now need to meet strict information governance and security requirements. 

Published: Dec 22, 2020
View More
flow-image
One Identity

The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution

Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users, but with other platforms such as Unix, Linux, and Mac OS X providing critical services as well. But each of these systems has its own identity, authentication, and access requirements....

Published: Feb 19, 2021
View More
flow-image
Adobe

Engaging the new digital workforce: A blueprint.

With many employees now working remotely and many others working on-site but at a physical distance, you may have found that your company needs a digital communication reboot. When those who were temporarily remote return, the workplace will not be the same as when they left. Physical distancing and virtual collaboration...

Published: Feb 17, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x