Mobile Devices
A Spec for Success: Building within a Common Data Environment
In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the...
An Authentication Authority at Your Fingertips: PingFederate
Having an authentication authority within your infrastructure allows you to have a single source of truth...
Common Browser Isolation Challenges and How to Overcome Them
Every security team wants to keep their employees and data safe from the latest threats. To accomplish...
Slack is Custom-Built for Enterprise Companies
Over the past few weeks, we've all been challenged to rethink how our teams work together. We've had...
Drive business growth with personalization
Personalizing content for a customer online is key to breaking through the noise. Yet brands face challenges...
Networking and Information Systems (NIS) Directive
The NIS Directive has been designed to work alongside data protection legislation. It will be governed...
Case Study – Asda
Asda is a UK supermarket retailer, based in Leeds. The business serves more than 18 million customers...
Stopping BEC and EAC Scams: A Guide for CISOs
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require...
Encryption Is Now a Trojan Horse: Ignore It at Your Peril
The game of leapfrog between hackers and data security professionals continues. No sooner do organizations...
OptiPlex: The Desktop Re-imagined
For 25 years, OptiPlex has continuously adapted to the new ways you work. The next generation of innovative...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.