IT White Papers

How to measure the ROI of cloud data protection

Reducing operational costs by the investment in cloud security

Date: 19/03/14

Company: Autonomy

Download now

12 things effective intrusion prevention systems (IPS) should do

Making the right choice in selecting an intrusion prevention system

Date: 18/03/14

Company: Dell

Download now

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems

Sophisticated exploits that utilize advanced evasion techniques are all too common

Date: 18/03/14

Company: Dell

Download now

Gartner Critical Capabilities for Enterprise Endpoint Backup

Enterprise endpoint backup refers to backup of endpoint devices

Date: 14/03/14

Company: Druva

Download now

5 Things You Didn't Know About Cloud Backup

Data privacy can easily be compromised by encryption key holders

Date: 13/03/14

Company: Druva

Download now

Managed Security Services and Incident Response

Discover how integrated services reduce risk and the impact of a security breach to organisations

Date: 12/03/14

Company: Dell

Download now

A CIO perspective: managing the 2014 cyber threat

What CIOs can do in 2014 to protect their business

Date: 10/03/14

Company: Websense

A CIO perspective: managing the 2014 cyber threat Download now

7 Must Haves for Mobile App Security

Mobile devices are not just another type of endpoint.

Date: 21/02/14

Company: Good Technology

Download now

In a BYOD world, MDM is not enough

Discover why a solution approach to Secure mobility is needed

Date: 21/02/14

Company: Good Technology

Download now

BYOD and Solid Security

Data-Centric BYOD can satisfy both employees and IT

Date: 21/02/14

Company: Good Technology

Download now


We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open