IM (Identity Management) Reports

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.
Posted: 16 Feb 2024 | Published: 20 Feb 2024

TechTarget ComputerWeekly.com

The Total Economic Impact™ Of Palo Alto Networks Prisma SASE
sponsored by Palo Alto Networks
FORRESTER TOTAL ECONOMIC IMPACT REPORT: Forrester does the heavy lifting for you in this Total Economic Impact report, analyzing the benefits, cost, and financial impact of Palo Alto Networks Prisma SASE from a third-party, neutral perspective. Access the report to view Forrester’s analysis.
Posted: 03 May 2024 | Published: 03 May 2024

Palo Alto Networks

Computer Weekly – 16 May 2017: Political turmoil threatens global IT services sector
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 May 2017

TechTarget ComputerWeekly.com

CW Nordics May 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
Posted: 08 Feb 2021 | Published: 25 May 2017

TechTarget ComputerWeekly.com

How to Ensure Mobile Employee Productivity with a Secure EMM Strategy
sponsored by BlackBerry
EGUIDE: Today an EMM strategy is not just about meeting employee demands for anytime, anywhere access to data and applications, it's also about maximizing employee productivity while keeping up with those demands. Discover an EMM suite that enhances mobile worker productivity and ensures mobile security.
Posted: 08 May 2017 | Published: 01 May 2017

BlackBerry

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Crafting an Identity-Based Security Strategy for Cloud
sponsored by Hewlett Packard Enterprise
EGUIDE: IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Hewlett Packard Enterprise

Managing Access to Keep Privileged Users' Credentials Secure
sponsored by TechTarget Security
EBOOK: Fighting creep through privileged user management is an essential but too often overlooked security practice. Inside this handbook, experts Michael Cobb and Joseph Granneman explain why the fight against privilege creep should be at the top of your security team's to-do list.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

TechTarget Security

SWIFT Security Controls to be Mandatory by 2018
sponsored by CyberArk
EGUIDE: Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk