• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
Veritas

Data Management in a Multi-Cloud World: Finance and Insurance Edition

This report focuses on a recent quantitative research study conducted with UK and Ireland IT decision makers (ITDMs). It explores how finance and insurance organisations are approaching cloud adoption, where the key challenges and apprehensions exist, and how organisations can look to overcome these challenges through...

Published: Dec 22, 2020
View More
flow-image
Proact (In Partnership With NetApp)

Maintaining ‘Business As Usual’ In Unusual Circumstances

The phrase ‘business as usual’ has a reassuring quality. It represents an ideal state in which the company is free to conduct its operations without disruption or interference. As enterprises face increasing volumes of cyber security threats, however, the phrase seems almost utopian. Just as you wouldn’t...

Published: Nov 30, 2020
View More
flow-image
Dell Technologies & Intel

The Ripple Effect Of Excellent EX

Organizations must empower, inspire, and enable their employees to serve their customers better. And employees  want the best technology, devices, and applications at their fingertips to do so.  All workers have an identity, which is shared across their values — and this is exactly what organizations...

Published: Nov 03, 2020
View More
flow-image
Veritas

A UK Public Sector Databerg Report

This UK Public Sector Databerg report surveyed senior Public Sector decision makers on the data challenges and issues they face. It highlights, for the first time, the degree of understanding their growing data estates now need to meet strict information governance and security requirements. 

Published: Dec 22, 2020
View More
flow-image
Dell Technologies & Intel

Understanding the Relationship between Cloud Management and Workload Placement

The decision of where to run applications has grown steadily more complex and cloudier over the past decade. On the heels of the transition from physical to virtualized infrastructure, public and private cloud infrastructure consumption models came to the fore.  Cloud consumption allows end-users to provision,...

Published: Nov 12, 2020
View More
flow-image
Malwarebytes

Cybercrime Tactics and Techniques - Attack on Home Base

The coronavirus pandemic has left the world looking very different at the end of the quarter than it did at the beginning. For starters, millions of workers are out of the office and working from their homes. This change in scenery, combined with safe social distancing efforts that help prevent the spread of COVID-19,...

Published: Nov 09, 2020
View More
flow-image
Proofpoint

Driving Real Behaviour Change

Today’s most potent cyber threat isn’t a zero-day vulnerability, new malware or the latest exploit kit. It’s your own users. That’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They...

Published: Nov 24, 2020
View More
flow-image
Veritas

Defend Against Ransomware

Defend your organization from evolving ransomware attacks. Learn what it takes to reduce risk and strengthen operational resiliency.

Published: Dec 22, 2020
View More
flow-image
Aruba

It’s 5 Toughest Work from Home Challenges and How To Solve Them

All of a sudden, you (and everyone else) found yourself working from home (WFH). The one advantage was the lack of a soul-crushing commute. Unfortunately, many of your co-workers had never really signed in from home, so help desk calls reached an all-time high. Questions ranged from how to access protected files, to whether...

Published: Dec 22, 2020
View More
flow-image
Egnyte

A Spec for Success: Building within a Common Data Environment

In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the construction industry. With consolidation in the sector and intensification of competition, companies have found themselves having to identify technology to help them become more efficient not only in the bidding process...

Published: Jan 18, 2021
View More
flow-image
Telstra

The Road to Recovery - Growing Your Business in China

The pandemic is fast tracking the digital transformation of organisations in China (and the region) as an increasing number of companies commit more resources to DX, to not only remain resilient during the pandemic, but to thrive after the crisis. The lesson from the China story is that despite the gloom and doom brought...

Published: Nov 16, 2020
View More
flow-image
Malwarebytes

Malwarebytes Incident Response

When a cyberattack occurs, speed is one of the most critical factors in the remediation process. Cyber-prepared security teams should aim to eradicate threats from the environment in under an hour to effectively combat sophisticated cyber threats and avoid the damage a successful breach can inflict on an organization’s...

Published: Dec 02, 2020
View More
flow-image
VMware

How to Achieve Cloud Success with Hybrid Cloud Operations

A hybrid cloud operating model can provide significant benefits for traditional and modernized IT. However, inconsistencies in operations management tools and processes put enterprises at risk. With VMware Cloud Foundation™, organizations build consistency across all layers of their infrastructure with a consistent...

Published: Jan 14, 2021
View More
flow-image
Pure Storage

Ransomware Protection with Pure and Veritas

Ransomware attacks continue to be top-of-mind for business and IT leaders. And for good reason. Ransomware compromises access to your organization’s lifeblood—data. Consequences can be dire: Pay perpetrators to (maybe) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups....

Published: Nov 27, 2020
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x