• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Management
flow-image
Malwarebytes

2021 State of Malware Report

The story of 2020 is of the devastating COVID-19 pandemic, and of how the world adapted. The story of malware in 2020 then, is a story of how the tools and tactics of cybercrime and cybersecurity changed against a backdrop of enormous changes to ordinary life. As entire businesses switched to remote working, IT teams...

Published: Feb 24, 2021
View More
flow-image
Imperva

A Closer Look at CCPA

How CCPA relates to the access to, deletion of, and sharing of personal information and intends to provide Californian citizens with knowledge of what personal data is being collected about them and whether their personal data is being disclosed or sold and to whom.

Published: Feb 08, 2021
View More
flow-image
Imperva

How Modern Database Security Complements Other Tools to Mitigate Risk

Too many enterprises still focus on edge and core security, and underinvest in data security. That’s the wrong approach. Databases hold most of your company’s most sensitive data, and remain the corporate asset most likely to be breached. Learn how modern data security such as data activity monitoring...

Published: Feb 08, 2021
View More
flow-image
Workday USA

Extensibility and Workday

Extensibility is the key to agility—and it all starts with the right technology. In our latest global innovation guide, learn how Workday Extend enables you to build custom apps that run alongside your existing Workday applications so you can stay agile in a changing world.

Published: Jan 29, 2021
View More
flow-image
Egnyte

Managing Sprawl in Microsoft 365

How content sprawl happens, why it matters, and steps every IT leader should take to avoid it. Sprawl happens when anyone and everyone can create a site or team, usually without oversight, planning, or any kind of formal training, resulting in dozens/hundreds of rarely used or abandoned sites and teams, a poorly-performing...

Published: Jan 18, 2021
View More
flow-image
Imperva

The Three Keys to Secure and Successful Cloud Migrations

To make cloud transformations as efficient and successful as possible, companies must remain secure and compliant throughout. This Executive Brief paper explains that there are three strategic best practices that are key to ensure a secure and compliant cloud migrations, which every enterprise IT and security leader...

Published: Feb 08, 2021
View More
flow-image
Okta

Okta: Decoding Customer IAM (CIAM) vs. IAM

The world of Identity and Access Management (IAM) is rarely controversial. But today, there is a battle brewing in how we—as an industry—talk about customer-facing use cases for IAM. Many are starting to refer to this as Customer IAM or Consumer IAM, both abbreviated as CIAM. CIAM does have some unique requirements....

Published: Feb 05, 2021
View More
flow-image
One Identity

Securely Managing Your UNIX Environment

With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems—with Microsoft Windows at the forefront—Unix-based organizations face many identity and access management (IAM) challenges. This white paper...

Published: Feb 19, 2021
View More
flow-image
Imperva

DDoS in the time of COVID-19

COVID-19 has caused major disruption to business on a global scale creating the perfect storm for cyber criminals. Organizations around the world have been forced to pivot and adapt to a new way of working in order to remain operational while millions of people have made the switch to remote working and sheltering in place....

Published: Feb 08, 2021
View More
flow-image
Okta

IDaaS for Dummies

This book consists of five chapters that explore:  The importance of identity, what it is, and how it has evolved (Chapter 1)  What modern identity (Identity as a Service) is and how it helps organizations address identity challenges and different use cases (Chapter 2)  The components of...

Published: Feb 05, 2021
View More
flow-image
Adobe

Cloud Service: A fully cloud-native, secure and scalable foundation for Adobe Experience Manager

Every enterprise today is looking for a strong foundation for their digital transformation. With the fast evolution of customer experience, marketers and developers must keep themselves ahead of the curve in customer experience management (CXM) technology to meet customer expectations.  Cloud Service provides...

Published: Feb 17, 2021
View More
flow-image
Fujitsu

Let's Reimagine the Workforce: How Europe Measures Up

In just a few months, we have witnessed how organisations can operate, survive and even thrive under extreme circumstances. The winners have made decisions at pace, tested and learned quickly, and found new ways of doing business centered on digital business models. See how your peers in Europe are transforming their...

Published: Dec 22, 2020
View More
flow-image
Dell Technologies & Intel Corporate

Key Storage Considerations in Determining Optimal Workload Placement

In early 2020, IDC performed in-depth primary research on how organizations determine workload placement as they evolve through digital transformation (DX) and what implications this has for modernized infrastructure objectives and strategies. Most IT organizations are in the midst of a DX. IDC defines DX as the continuous...

Published: Jan 26, 2021
View More
flow-image
Egnyte

A Spec for Success: Building within a Common Data Environment

 In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the construction industry. With consolidation in the sector and intensification of competition, companies have found themselves having to identify technology to help them become more efficient not only in the bidding...

Published: Feb 02, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x