We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

IT White Papers

Security white papers

Encryption key management

Overview of the different types of encryption keys used

Date: 09/12/13

Company: Dell

Download now

Outcome based security monitoring in a continuous monitoring world

Discover an approach that leverages distributed scanning, sniffing and log analysis

Date: 27/11/13

Company: Tenable

Download now

Are your person-centric file transfers putting you at risk?

What type of solution addresses the person-to-person file transfer requirements of the enterprise?

Date: 26/11/13

Company: IBM

Are your person-centric file transfers putting you at risk? Download now

Definitive Guide to Next-Generation Vulnerability Management

Discover how you can understand vulnerability management

Date: 26/11/13

Company: Tenable

Download now

Improving Web Security Intelligence

As security issues evolve, organisations’ intelligence efforts aren’t keeping up

Date: 22/11/13

Company: Akamai

Download now

Business grade security

Can you stay secure in the fast developing IT landscape?

Date: 12/11/13

Company: TalkTalk

Business grade security Download now

MSQ Partners antivirus case study

Consolidate your antivirus solution

Date: 06/11/13

Company: Sophos

MSQ Partners antivirus case study Download now

Are all of your employees applying all security updates to all of their devices?

Consumer behavior is reshaping corporate IT

Date: 21/10/13

Company: Secunia

Are all of your employees applying all security updates to all of their devices? Download now

Email Security banishes spam for Macmillan Cancer Support

Solving spam issues affecting Macmillan’s email system performance

Date: 16/10/13

Company: Mimecast

Email Security banishes spam for Macmillan Cancer Support Download now

IBM The Economics of IT Risk and Reputation

What business continuity and IT security really mean to your organisation

Date: 10/10/13

Company: IBM

Download now


ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open