• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
  • /
  • Authentication & Access Systems
flow-image
Rapid7

2021 Technology Industry Cyber Threat Landscape Report

The technology industry is a top target for both cybercriminals and state-sponsored cyber espionage groups. Attacks on technology companies can affect organizations in other industries, as well as individual consumers, because so many organizations and individuals rely...

Published: Jun 09, 2022
View More
flow-image
NortonLifeLock

What is ransomware and how to help prevent ransomware attacks

Knowing the types of ransomware out there, along with some of the dos and don’ts surrounding these attacks, can go a long way toward helping protect yourself from becoming a victim of ransomware. Read our article to discover more.

Published: Jun 13, 2022
View More
flow-image
Box

Box and ECM: Key integrations that drive digital transformation

Legacy ECM solutions simply can't keep up with the way you work today. Work is more mobile, more collaborative, more agile. Business processes must be intelligent. And customer expectations never stop growing.  Fortunately, cloud-based ECM solutions are rising to the challenge. Our new eBook,  Box and...

Published: May 13, 2022
View More
flow-image
Workday USA

Create a Modern Software Strategy with AI-Driven Platforms and Their Ecosystems

Learn how your organization can move away from outdated legacy systems and transition to nimble, innovative solutions based on open ecosystems and a microservices-based approach.

Published: May 17, 2022
View More
flow-image
Rockwell Automation

A Comprehensive Resource Guide for Securing Critical Infrastructure

Critical Infrastructure organizations are undergoing digital transformation, digitizing processes and adopting Internet of Things (IoT) technology to improve efficiency and reliability. The resulting connectivity of operational technology (OT) to the internet and the convergence between OT and IT have created extreme...

Published: Jun 30, 2022
View More
flow-image
RingCentral

Unified Communications as a Service

As businesses increasingly embrace a cloud-first strategy, many are migrating their most heavily used business applications — including office productivity, customer relationship management (CRM), customer care, and more — to the public cloud. In today’s remote workplace, in which work from home (WFH)...

Published: Jun 30, 2022
View More
flow-image
VMware

Addressing Top Five Challenges of Deploying a Comprehensive Disaster Recovery Solution

Even a minor outage can put organizations at a competitive disadvantage, especially in today’s markets. In order to succeed, it is important to have a business continuity strategy in place that protects all data and applications from unplanned system failures. As a result, many enterprises are turning to the public...

Published: May 24, 2022
View More
flow-image
RingCentral

Hybrid Work: Why it's time to move your on-premises PBX to the cloud

For years, the shift to cloud-based communications services was gradual, with some organizations going full force and others cautiously dipping their toes. This all changed in 2020 as employees moved en masse to work from home (WFH), bringing their business phone systems and other communication tools along with them....

Published: Jun 30, 2022
View More
flow-image
Juniper Networks

SASE: Beyond the Hype

Solve network and security management challenges with a Secure Access Service Edge architecture This white paper will help map the journey by explaining what SASE is, why it matters, and the benefits it brings to your network architecture.

Published: Jun 16, 2022
View More
flow-image
Palo Alto Networks

Public Sector Cloud Journey

As the government continues to move workloads to the cloud, many agencies are struggling to automate cloud security and mitigate cloud risks. Several important challenges must be addressed. Read on to find out more.

Published: Jun 10, 2022
View More
flow-image
Box

Hope is NOT a strategy: Secure your business with the Content Cloud

Seems like every week there's news of another cybersecurity breach. Ponemon Institute has found that the typical data breach costs an average of $3.9 million, and that just one breach can decrease your company's stock price by 5%. No one wants to be that kind of typical — no what can you do about it? ...

Published: May 13, 2022
View More
flow-image
Illumio

Oracle NetSuite Protects Flagship Business Applications With Illumio

Find out how SaaS leader Oracle NetSuite improves security and uptime for 7,500 application workloads with real-time visibility and Zero Trust segmentation.

Published: Jun 07, 2022
View More
flow-image
VMware

IDC Whitepaper: Achieving Network Modernization for the Decade Ahead

Every organization is now defined by the digital services it delivers. From engaging customers with new experiences to building new revenue opportunities, and driving digital-first touchpoints that protect and enable customers and communities, these services have never been more essential. As part of VMware’s work...

Published: Jun 17, 2022
View More
flow-image
Dell Technologies & AMD EPYC

Analyse: Accelerate data processing with Dell EMC PowerEdge servers

More and more industries are becoming reliant on their ability to process large volumes of data. For example, in the financial industry, crunching more data, placing trades quicker and developing smarter algorithms are now competitive advantages, all of which are enabled by technology. Dell Technologies and AMD work closely...

Published: Feb 09, 2022
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon