ANALYST REPORT:
The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
EGUIDE:
In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
EGUIDE:
While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
EGUIDE:
The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
EGUIDE:
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
EZINE:
An issue looking at what products are in demand now in the storage world and what technologies are coming that need to be embraced by the channel.
EGUIDE:
Ensuring security in a software-defined WAN implementation is crucial, but it's often easier said than done. The SD-WAN security equation comprises multiple variables. In this e-guide, uncover 4 different areas where enterprises should consider SD-WAN and security, as well as the core capabilities to include in an SD-WAN security checklist.
EZINE:
In this issue of CW EMEA, we look at the startup scene in Finland. Every startup needs a starting place, and many Finnish innovators began at Aalto University. We also look at how the Gulf region is seeing some of the heaviest investments in the latest technology as countries diversify their economies to reduce reliance on oil. Read the issue now.
EGUIDE:
In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.