Enterprise Single Sign-on Reports

Computer Weekly Innovation Awards APAC 2024 - Nomination form
sponsored by TechTarget ComputerWeekly.com
DATA SHEET: The Computer Weekly Innovation Awards APAC 2024 will once again shine the spotlight on digital transformation projects that have delivered business impact and/or solved problems using innovative approaches. All entries will be assessed by an independent panel of judges. Download your nomination form here.
Posted: 30 Nov 2023 | Published: 01 Dec 2023

TechTarget ComputerWeekly.com

MicroScope – February 2023: Opportunities in security
sponsored by MicroScope
EZINE: In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
Posted: 31 Jan 2023 | Published: 01 Feb 2023

MicroScope

Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.
Posted: 13 Mar 2023 | Published: 14 Mar 2023

TechTarget ComputerWeekly.com

Computer Weekly – 26 March 2024: What are IT buyers spending their money on?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal the technologies that IT buyers are spending their money on this year. The European CIO at PepsiCo explains how to make digital transformation go with a pop. And we look at the growing importance of cloud-to-cloud backup for data protection and resilience. Read the issue now.
Posted: 25 Mar 2024 | Published: 26 Mar 2024

TechTarget ComputerWeekly.com

5 types of data security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

AI in Fraud Management: Uses cases, benefits and challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
Posted: 01 Mar 2023 | Published: 08 Mar 2023

TechTarget ComputerWeekly.com

Speed Up Your Software Development Cycle
sponsored by Slack
WHITE PAPER: Learn how to accelerate coding and deliver more software faster.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

CW APAC October 2023 – Buyer’s guide to IAM
sponsored by TechTarget ComputerWeekly.com
EZINE: Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.
Posted: 19 Oct 2023 | Published: 19 Oct 2023

TechTarget ComputerWeekly.com

Flexible IT Models Drive Efficiency and Innovation
sponsored by Dell Technologies and Intel
ESG: ESG recently conducted a survey to understand whether, and to what degree, an organization’s adoption of technologies and processes that enable flexible IT service delivery are correlated to IT and business benefits, as well as key challenges they may face by lagging behind. Open up this white paper to uncover key findings from the study.
Posted: 15 Feb 2023 | Published: 28 May 2021

TOPICS:  IT Management
Dell Technologies and Intel

The Holistic Identity Security Maturity Model
sponsored by CyberArk
WHITE PAPER: Understanding where your organization stands in the Identity Security Maturity Model can help you identify gaps and plan for improvement in your Identity Security strategy. Read this paper to learn more and find your place in the model.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk