Perimeter Security Reports

The State Of Zero Trust Transformation 2023
sponsored by Zscaler
RESEARCH CONTENT: Read this report to learn what 1,900 senior decision-makers around the globe had to say about how their zero trust deployments are progressing, the impacts of hybrid work and emerging technologies.
Posted: 15 Feb 2023 | Published: 15 Feb 2023

Zscaler

Top IT predictions in APAC: 2021
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Going by the predictions fleshed out by technology suppliers and analysts, the Asia-Pacific region will continue to be a cradle for technology innovation, whether it is 5G services, artificial intelligence (AI), cloud computing or cyber security. In this infographic, we review some of the key IT trends that are likely to shape the industry in 2021.
Posted: 08 Feb 2021 | Published: 15 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 May 2018

TechTarget ComputerWeekly.com

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

The future is SASE: Transform your enterprise network for good
sponsored by TechTarget ComputerWeekly.com
EBOOK: Less than a year after it received an official name, Secure Access Service Edge has started to disrupt the networking and security markets. As incumbent vendors make strategic moves to build SASE offerings, the nascent technology has the potential to upend traditional networking and security.
Posted: 05 Dec 2022 | Published: 05 Dec 2022

TechTarget ComputerWeekly.com

CIO Trends India
sponsored by TechTarget ComputerWeekly.com
EGUIDE: CIOs in India have been put to the test as their organisations implement remote work arrangements amid the Covid-19 pandemic. We look at the impact of the coronavirus outbreak on India's IT industry, why a pandemic specific BCP matters and how CIOs can harden up their datacentre equipment supply chains post-Covid-19.
Posted: 08 Feb 2021 | Published: 03 Jun 2020

TechTarget ComputerWeekly.com

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

5G: APAC guide to next-gen mobile connectivity
sponsored by TechTarget ComputerWeekly.com
EGUIDE: From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
Posted: 08 Feb 2021 | Published: 20 Apr 2020

TechTarget ComputerWeekly.com

Security Outcomes for Zero Trust
sponsored by Cisco DUO
WHITE PAPER: Zero-trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in adoption reflects a fast-changing reality - boundaries that once existed to secure access to corporate data no longer exist. Learn about some secrets to success in this Cisco white paper.
Posted: 23 Feb 2024 | Published: 23 Feb 2024

Cisco DUO

Can a zero-trust approach fill the security perimeter void?
sponsored by TechTarget Security
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

TechTarget Security