• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
flow-image
Fujitsu

Key Considerations to Supporting Work-At-Home Directives for Business Continuity

When a disruption occurs that can impact the workplace, it is essential that businesses have alternative means for their employees to continue working, including remote working policies. And organisations that take steps today to improve how their employees work from home can realise numerous benefits, particularly when...

Published: Jan 15, 2021
View More
flow-image
Malwarebytes

Best Practice Makes Perfect: Malware Response in The New Normal

Before Covid-19, cyber security teams already confessed to being overworked – battling simply to keep their heads above a constant tide of security alerts, across numerous tools and reports. High profile security breaches, with malware at their root, were a seemingly weekly occurrence. The financial and reputational...

Published: Dec 02, 2020
View More
flow-image
Illumio

Enable End-to-End Zero Trust To Achieve Effective Outcomes

Illumio was named a Leader in Forrester’s latest Wave report evaluating the top Zero Trust platform providers. Out of 15 vendors, Illumio received the highest scores in the three primary categories.  Zero Trust priorities have evolved in 2020 to require solutions that secure your remote workforce with an...

Published: Jan 18, 2021
View More
flow-image
Egnyte

A Spec for Success: Building within a Common Data Environment

In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the construction industry. With consolidation in the sector and intensification of competition, companies have found themselves having to identify technology to help them become more efficient not only in the bidding process...

Published: Jan 18, 2021
View More
flow-image
Egnyte

Decrease Downtime and Increase Efficiency, Collaboration and Profitability

Across the State of Qatar – in football stadia and landmark buildings, on highways and critical infrastructure sites, and in Plant Machinery and Vehicle (PMV) facilities – hundreds of employees are sharing thousands of documents. All to ensure that AlJaber Engineeringv’s (JEC) multi-million dollar construction...

Published: Jan 18, 2021
View More
flow-image
AWS

Digital transformation for UK policing

Policing in the UK is a benchmark for other law enforcement agencies around the world. Innovation across all platforms is accelerating but so is the pace of new challenges. Everevolving criminality, accelerated demand from cybercrime, and the increasing complexity and scale of digital evidence are placing additional demands...

Published: Dec 18, 2020
View More
flow-image
Illumio

Secure Beyond Breach

Securing the perimeter is no longer enough. The focus has shifted to ensuring your organization continues to function if and when you’re breached — and that’s what micro-segmentation is all about. This book will help you become secure beyond breach. Based on real-world scenarios and written...

Published: Jan 18, 2021
View More
flow-image
Malwarebytes

Cybercrime Tactics and Techniques - Attack on Home Base

The coronavirus pandemic has left the world looking very different at the end of the quarter than it did at the beginning. For starters, millions of workers are out of the office and working from their homes. This change in scenery, combined with safe social distancing efforts that help prevent the spread of COVID-19,...

Published: Nov 09, 2020
View More
flow-image
Proact (In Partnership With NetApp)

Maintaining ‘Business As Usual’ In Unusual Circumstances

The phrase ‘business as usual’ has a reassuring quality. It represents an ideal state in which the company is free to conduct its operations without disruption or interference. As enterprises face increasing volumes of cyber security threats, however, the phrase seems almost utopian. Just as you wouldn’t...

Published: Nov 30, 2020
View More
flow-image
Kronos

The New Future of Work

To address the challenges of 2020 and emerge stronger in this New Future of Work organisations need to embrace data-driven workforce transformation. Through research and our partnerships with leading businesses globally it’s clear that to thrive in the future, organisations must focus on four critical pillars: ...

Published: Jan 14, 2021
View More
flow-image
Proofpoint

Driving Real Behaviour Change

Today’s most potent cyber threat isn’t a zero-day vulnerability, new malware or the latest exploit kit. It’s your own users. That’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They...

Published: Nov 24, 2020
View More
flow-image
Egnyte

Managing Sprawl in Microsoft 365

How content sprawl happens, why it matters, and steps every IT leader should take to avoid it. Sprawl happens when anyone and everyone can create a site or team, usually without oversight, planning, or any kind of formal training, resulting in dozens/hundreds of rarely used or abandoned sites and teams, a poorly-performing...

Published: Jan 18, 2021
View More
flow-image
Veritas

Defend Against Ransomware

Defend your organization from evolving ransomware attacks. Learn what it takes to reduce risk and strengthen operational resiliency.

Published: Dec 22, 2020
View More
flow-image
Zscaler

Zscaler Private Access as an Alternative to VPN

For almost 30 years, enterprises have relied on the remote access VPN to connect remote users to the internal LAN. But the way users work has changed. They can now use the cloud to connect to any application, on any device, and from anywhere—without the need for a VPN. We now live in a world of cloud and mobility,...

Published: Jan 18, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x