• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
  • /
  • Disaster Recovery
flow-image
ServiceNow

Create continuity plans that minimize disruptions and protect critical assets​

Discover how to make creating an effective BCM plan simple, by moving business continuity and disaster recovery onto a single platform.​​

Published: Apr 04, 2022
View More
flow-image
ServiceNow

Leadership trends report: operating excellence

Optimising business operations used to mean just lowering costs and increasing profits. But today, you also need to drive value while facing emerging technologies, cyber security and risk, and environmental and social issues. Read this 2022 Trends Report to learn how you can power constant innovation and achieve true operational...

Published: Apr 04, 2022
View More
flow-image
ServiceNow

Activate ESG Use Case Guide

Incorporating robust ESG practices into business strategy and execution is critical, not only to be a good corporate citizen and ensure regulatory compliance, but also to drive and maintain customer, investor, and employee loyalty. Through technology and a consumer-grade user experience, ServiceNow® embeds ESG concepts...

Published: Apr 04, 2022
View More
flow-image
Informatica

Six Steps to Intelligent Data Privacy

Explosive data growth is a double-edged sword. On one hand, it’s enabling the most disruptive and exciting companies in the world to create competitive advantages and develop brand new products and services. On the other, you have to deal with more sensitive data exposure and misuse than ever before. Governing this...

Published: Feb 08, 2022
View More
flow-image
Informatica

Six Steps to Intelligent Data Privacy

Explosive data growth is a double-edged sword. On one hand, it’s enabling the most disruptive and exciting companies in the world to create competitive advantages and develop brand new products and services. On the other, you have to deal with more sensitive data exposure and misuse than ever before. Governing this...

Published: Feb 08, 2022
View More
flow-image
F5 Networks

Office of the CTO Report: Continuous API Sprawl

APIs are a contract between the service provider and service consumer. When any application uses an API, it needs to conform to an agreed-upon standard, with implicitly set expectations. What happens behind the scenes is of no concern to the consumer, enabling the service provider to use whatever means necessary to deliver...

Published: May 23, 2022
View More
flow-image
F5 Networks

API Security Best Practices

Application Programming Interfaces, or APIs, were developed to streamline the way digital ecosystems communicate and interact with each other. At their core, APIs abstract the complexity of connecting multiple disparate systems. This allows developers to integrate third-party content or services quickly and easily into...

Published: May 23, 2022
View More
flow-image
Hitachi Vantara

Hitachi Content Software for File: High-Performance Storage for AI and ML

Hitachi Content Software for File unites one of the fastest distributed file systems with one of the best object stores and delivers it through a single vendor with a single point of contact for support. Key Data Points High performance, POSIX compliant distributed file system. Scalable, flexible, intelligently...

Published: May 21, 2021
View More
flow-image
Dell

SSL VPN Technical Primer

This primer explains the basics of SSL VPN technology and includes distinguishing factors between Internet Protocol Security (IPSec) and SSL VPN technologies.

View More
flow-image
HP

The Bot Threat; HP Whitepaper

Today enterprise networks can be attacked in a number of ways. None are more daunting than the Internet robot or simply, the bot. Bots are malicious code programs that are automated to infect a computer network. They can strike in so many different ways that traditional network security is often ineffective in blocking...

View More
flow-image
Fuze

The Unified Communications Buyer’s Guide to Security & Business Continuity

The decision to invest in new technology should never be taken lightly. From calculating ROI to anticipating and negotiating contracts and changes in infrastructure, there are a multitude of factors to consider when making the transition to a new or upgraded communication service. Yet while financial and...

View More
flow-image
Symantec

Symantec Intelligence Report: August

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

View More
flow-image
Fortinet

Data Center Trends And Network Security Impact

The Data Center is rapidly evolving with recent trends such as Virtualization, Cloud computing, Software Defined Networks (SDN), and Network Function Virtualization (NFV). What are these new technologies and how they impact network security in the data center? This whitepaper covers key concepts and overview of these...

View More
flow-image
Fortinet

Is Your Data Center Ready for Today's DDoS Threats?

Distributed Denial of Service (DDoS) attacks are some of the oldest Internet threats and continue to be the top risk to networks around the world. As protections have evolved, the technology used by hackers has adapted and has become much more sophisticated. New attack types now target applications and services, and many...

View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon