Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Latest Security White papers


2014 Gartner Critical Capabilities for SIEM

Learn how Gartner can help you succeed

Gartner Magic Quadrant for Security Information and Event Management

Exclusive analyst findings

IBM QRadar Security Intelligence: Evidence of Value

Security of sensitive information about people and organisations

5 critical steps to achieving an effective application security program

Practical approaches for incorporating security into every phase of the development process

10 Things Your Next Firewall Must Do Ebook

Enable consistent security for all users and devices

Networks The 2014 Firewall Buyers Guide

The definitive guide for evaluating enterprise network firewalls

Cybersecurity for Dummies

Identify key characteristics of advanced malware

10 Things Your Next Firewall Must Do

Without question, your network is more complex than ever before.

Targeted cyber attacks, a real and present danger

Enterprises face new wave of advanced persistent threats

Secure, Centralised, Simple

Multi-platform enterprise mobility management

The Secret Ingredient in Mobile ROI

Why security is paramount in EEM

There's Good Security and Then There's National Security

The perfect balance of protection and productivity

Tracking the 5 Ws of Change in Active Directory, SharePoint, SQL Server, Exchange and VMware

Discover why you need visibility into your key infrastructure technologies

Protect against targeted attacks with security intelligence

This IDC Executive Brief document analyzes the evolving threat landscape

IBM Threat Protection System

A dynamic, integrated system designed to disrupt the lifecycle of advanced attacks and help prevent loss

5 security considerations in the mobile age

Strengthen security in mobile environments with WebSphere DataPower appliances

The hidden costs of self-signed SSL certificates

Why self-signed certificates are much costlier and riskier than working with a trusted security vendor

Still Using Proxies for URL Filtering? There’s a Better Way

Reevaluate your original proxy requirements

Cybersecurity imperatives: reinvent your network security

Cybersecurity has become a leading topic both within and beyond the corporate boardroom.

Getting Started With a Zero Trust Approach to Network Security

Providing effective security for modern networks

Application, usage and threat report

An analysis of applications and their link to cyber threats within the enterprise

Protection for Every Enterprise

How BlackBerry security works

Mitigating security and compliance risks with EMM

Examine multiple device management strategies for their capabilities to protect the enterprise against loss

The Top 8 Mobile Security Risks

How to protect your organisation

IT executive guide to security intelligence

Setting security intelligence goals


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map