• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Management
flow-image
Imperva

The Anatomy of Account Takeover Attacks

Bad bots are on every website with a login page. Even yours. Hackers and fraudsters use bots to validate sets of login credentials, gain access to credit card data, and sell personally identifiable information on the dark web. They also use stolen account data to transfer money, purchase goods, or spread a specific...

Published: Feb 08, 2021
View More
flow-image
Tintri

The Role of Machine Learning and Automation in Storage

There has been lots of hype around the increasing role that machine learning, and artificial intelligence more broadly, will play in how we automate the management of IT systems. Whether it's labelled as Intelligent Infrastructure , AIOps, “self-driving IT”, or even private cloud, the aim is the same: to...

Published: Dec 22, 2020
View More
flow-image
HappySignals

The Practical Guide to XLAs

No matter the size of your business – in 2021 and beyond – for IT organizations to effectively respond to business needs, deliver positive experiences, and drive productivity and value, you need to be constantly monitoring, managing, and maintaining end-user experiences. Whether or not you’re successful...

Published: Feb 12, 2021
View More
flow-image
Okta

IDaaS for Dummies

This book consists of five chapters that explore:  The importance of identity, what it is, and how it has evolved (Chapter 1)  What modern identity (Identity as a Service) is and how it helps organizations address identity challenges and different use cases (Chapter 2)  The components of...

Published: Feb 05, 2021
View More
flow-image
F5 Networks

Edge Computing in Telco Networks: Gaining the Competitive Edge

Earlier this year, Wind River® teamed up with F5, Schneider Electric, and Heavy Reading on a global survey of communications service providers (CSPs) in order to better understand what drives their edge computing strategies. Download this paper to get the details about out how CSP's are approaching their edge business....

Published: Feb 25, 2021
View More
flow-image
Veritas

Ransomware Protection with Veritas NetBackup Appliances

Download this whitepaper to discover how to protect your backup and recovery infrastructure from attacks. 

Published: Dec 22, 2020
View More
flow-image
Mitel

Barometer of Cloud Telephony Adoption in Europe

An economy based on distancing has emerged following the COVID-19 crisis that has affected European companies. Mitel’s 2020 Cloud Survey shows that European companies were already moving towards cloud technology well before the pandemic crisis, and that it will not affect the trend towards new technological models...

Published: Nov 11, 2020
View More
flow-image
Mitel

Customer Experience Challenges in Pandemic Times

Delivering great customer experiences (CX) isn’t always easy, even in the best of times. When the stakes are high like today and customers are being especially cautious in spending, bad CX can put an organization’s very survival at risk. Rising call volumes due to COVID-19 and anxious customers have only amplified...

Published: Feb 11, 2021
View More
flow-image
Mitel

Know Your Options Before Moving To The Cloud

It’s imperative for company and IT leaders to understand that the term “cloud” is very broad and can mean different things to different businesses. This report highlights the importance of cloud delivery and provides some insight regarding how organizations should think of the various cloud “flavors”...

Published: Feb 11, 2021
View More
flow-image
F5 Networks

Building Better 5G Security: How to harness and adapt IT best practices to protect 5G core networks

As Mobile Network Operators (MNOs) implement standalone 5G core networks, they will need service-based architectures built using IT concepts and protocols like HTTP/2, APIs, and microservices. These 5G networks will rely on data centres at the edge of the network to support responsive connectivity. This white paper...

Published: Feb 25, 2021
View More
flow-image
Behavox

HOW TO (LEGALLY) AVOID PAYING FINES IN THE FINANCIAL SECTOR

There are many different categories, or scenarios, in which financial firms can fall foul of regulatory misconduct. In this white paper, we look at the most common scenarios, detailing some of history’s most heinous examples and revealing how Behavox could have stopped them by catching the true positives in internal...

Published: Feb 03, 2021
View More
flow-image
Veritas

The UK 2020 Databerg Report Revisited

Cloud technology hasn’t been around for long, but it’s evolution in that time has been nothing less than staggering.And with that, the level of understanding around what can be achieved through deploying a cloud environment has also grown at a rapid pace, particularly in the past five years. No longer simply...

Published: Dec 22, 2020
View More
flow-image
Veritas

Defend Against Ransomware

Defend your organization from evolving ransomware attacks. Learn what it takes to reduce risk and strengthen operational resiliency.

Published: Dec 22, 2020
View More
flow-image
Workday USA

Planning and Execution Guide

In this guide, learn how retailers can rethink the planning process with better insights, more collaboration, and easier reporting for long-term agility.

Published: Jan 29, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x