• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

UK | USA | FR | DE | ES | IT | SE | NL
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Hardware
flow-image
Corelight

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption.

The most advanced security teams rely on network traffic as a fundamental data source, ground truth for security investigations, but encryption has made certain aspects of that truth increasingly difficult to obtain. Recent industry reports reveal that more than 72% of Internet-bound network traffic...

Published: Mar 13, 2020
View More
flow-image
Centrify

Centrify Zero Trust Privilege and Password Vaults

Privileged Identity Management (PIM) solutions are based on a variety of fundamental technologies, with each technology suited to address a specific set of identity-related risks. This paper describes these technologies, how they complement each other and includes detailed reasons why Centrify’s integrated Zero...

Published: Apr 25, 2019
View More
flow-image
Tripp Lite

Top 8 Considerations for Choosing the Right Rack Power Distribution Units to Fit Your Needs

So how can you determine which rack PDUs are appropriate for your needs and applications? What type of infrastructure challenges are you facing, and what factors do you need to consider in terms of your applications so that you know what questions to ask when evaluating PDUs? Here are the top eight things you need...

Published: Jul 15, 2013
View More
flow-image
Box

Protect Your Company’s Information Assets

Learn what is information governance and how it can protect your company. Information is, arguably, an organization’s most important asset. Regardless of where it resides, it must be governed. If not governed properly, information is subject to misuse, loss, and mismanagement, resulting in poor organizational performance...

Published: May 14, 2019
View More
flow-image
Centrify

Privilege Access Management Buyers’ Guide

Security breaches show no signs of slowing, and credential theft is the number one attack vector. Privileged access has become hackers’ brass ring for stealing the most data, most efficiently. Companies are rethinking their approach to privileged access management and strengthening their company’s identity...

Published: Apr 25, 2019
View More
flow-image
Carbon Black

The Ominous Rise of Island Hopping & Counter Incident Response Continues

Cybercrime certainly isn’t basketball — the stakes are higher, your jump shot doesn't matter — and yet the principle remains the same. As incident response (IR) teams and their vendors raise the defensive bar, adversaries adapt in kind. According to the world’s leading IR professionals,...

Published: Jul 26, 2019
View More
flow-image
Red Hat

The Business Value of Red Hat Enterprise Linux

 Linux has firmly established itself as a preferred delivery vehicle for modern applications; in addition to that role, it has become the preferred platform for cloud infrastructure. The credibility of Linux didn’t just happen overnight; credibility has been cultivated from humble beginnings and by patiently...

Published: Apr 08, 2019
View More
flow-image
LogRhythm

Threat Hunting 101: 8 Threat hunts you can do with available resources

In this white paper, we will discuss the minimum toolset and data requirements you need for successful threat hunting. We will take into account that, while some readers can devote most of their time to threat hunting, like most, you have limited time and resources for this activity. The good news is that threat hunting...

Published: Apr 15, 2019
View More
flow-image
Dell

Dell Precision Workstations

Dell Precision delivers versatile designs, top performance & reliability to conquer the industry’s most demanding applications. From award-winning filmmakers and animators to architects and engineers, Dell's expansive portfolio enables you to customise the workstation for your creative expertise. ...

Published: Jan 28, 2019
View More
flow-image
IT Corporate

Python for DevOps: Learn Ruthlessly Effective Automation

Much has changed in technology over the past decade. Data is hot, the cloud is ubiquitous, and many organizations need some form of automation. Throughout these transformations, Python has become one of the most popular languages in the world. This practical resource shows you how to use Python for everyday Linux systems...

Published: Jan 08, 2020
View More
flow-image
LogRhythm

Networking and Information Systems (NIS) Directive

The NIS Directive has been designed to work alongside data protection legislation. It will be governed in line with the EU General Data Protection Regulation (GDPR), which has the power to impose significant penalties and fines on organisations that fail to comply. The key distinction between the NIS Directive and...

Published: Apr 15, 2019
View More
flow-image
Carbon Black

Improving Threat Hunting with Big Data

A recent survey of IR professionals1 indicated that while financial and retail sectors are the most targeted by cyberattackers, 27% of IR professionals noted recent attacks specifically aimed at government entities. And the attacks they are facing are only getting worse. IR firms said that victims experienced destructive...

Published: May 29, 2019
View More
flow-image
Citrix

A day in the life of a remote worker

An always-connected workforce demands instant, secure access to critical business apps, desktops, and data, from anywhere and from any device. Find out how Citrix can deliver secure remote access to your on-the-go workforce. Help your customers see why a Citrix digital workspace is the only single-vendor solution...

Published: No Date
View More
flow-image
Citrix

Building the Digital Workplace: What comes next in the mobile revolution

The days when having a job meant traffic jams, cubicles, and a 9-to-5 schedule are coming to an end. Work now comes to you, and with you, wherever and whenever you decide. Mobile technology and new approaches to management are creating a new kind of digital workplace that can increase productivity, lower costs, and reduce...

Published: Oct 31, 2019
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Contact Centre
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Finance
  • Hardware
  • Human Resources
  • IT Management
  • IT Security
  • Marketing
  • Mobile Computing
  • Network
  • Sales
  • Software
  • Storage
  • Telecommunications
Contact Us

info@itcorporate.com

Call +44(0)  1932 564999

Contact Us

© Copyright: Huson European Media Limited. Company Number: 03183235

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x