Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER:
This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008
|
|
|
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER:
SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007
|
|
|
The Defender’s Advantage
sponsored by Google
EBOOK:
By reading this e-book, you will understand how to activate your cyber defense with an intelligence-led approach. Read on now to learn how you can leverage threat intelligence, detection engineering, and coordinated incident response to maximize your Defender's Advantage and strengthen your cybersecurity posture.
Posted: 17 Jan 2025 | Published: 21 Jan 2025
|
|
|
Trust Emerges as Cybersecurity Issue for 42% of Security Decision-Makers
sponsored by XtelligentMedia Healthcare
EGUIDE:
With cyberattacks on the rise, trust in teams and technology is crucial. However, 42% of security leaders see a trust deficit as their biggest hurdle, a new survey showed. Some trust is also misplaced, with 66% of security leaders trusting employees to prevent cyberattacks more than their own teams. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023
|
|
|
Frost Radar MDR 2024
sponsored by LevelBlue
ANALYST REPORT:
Effective security management is more crucial than ever. But how do you navigate the complex cybersecurity landscape, especially with a persistent shortage of skilled personnel in the field? Download this report to discover why LevelBlue is named a leader in the Frost Radar: Global MDR Market 2024.
Posted: 27 Aug 2024 | Published: 28 Aug 2024
|
All resources sponsored by LevelBlue
|
|
Aerospace and Defense Airbus
sponsored by Siemens
CASE STUDY:
Airbus enhanced its flutter analysis for the A380 using Siemens Simcenter Testlab software. This solution efficiently processed vast in-flight data, provided clearer stabilization diagrams, and improved synthesis correlations. Explore this case study to see how Operational Modal Analysis capabilities surpassed traditional mode identification.
Posted: 24 Apr 2025 | Published: 24 Apr 2025
|
|
|
Aerospace And Defense Pilatus
sponsored by SWPL
CASE STUDY:
Pilatus Aircraft digitalized their manufacturing with Mendix and Teamcenter, reducing paperwork and enhancing transparency. They now have a 3-month average time-to-market for new Mendix-built solutions, improved quality standards, and fully documented workflows. Read the case study to see how Pilatus achieved connected manufacturing excellence.
Posted: 03 Apr 2025 | Published: 03 Apr 2025
|
|
|
Frost Radar : Managed Security Services in the Americas, 2024
sponsored by LevelBlue
ANALYST REPORT:
Frost & Sullivan's analysis of the managed security services market in the Americas highlights the growth opportunities driven by the evolving threat landscape and the need for comprehensive security solutions. Read the full report to learn about leading providers and key market trends.
Posted: 27 Aug 2024 | Published: 28 Aug 2024
|
All resources sponsored by LevelBlue
|
|
Back to the Basics, Other Payment Integrity Strategies Post-PHE
sponsored by XtelligentMedia Healthcare
EGUIDE:
Fraud in healthcare isn't as black and white as in other industries, so providers need a comprehensive payment integrity strategy after the COVID-19 public health emergency. The back-to-the-basics approach has become a good choice after the expiration of the PHE. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023
|
|
|
Aerospace And Defense Mercury Systems
sponsored by SWPL
CASE STUDY:
Mercury Systems used Mendix's low-code platform to create a digital thread linking manufacturing systems across the product lifecycle. By centralizing data from various tools, they developed 20 applications to boost transparency, speed delivery, and drive innovation. Learn how their portal provides engineers with comprehensive product views.
Posted: 03 Apr 2025 | Published: 03 Apr 2025
|
|
|
Aerospace And Defense Bae Systems
sponsored by SWPL
CASE STUDY:
BAE Systems used Mendix low-code to tackle IT backlogs and avoid shadow IT. They created 15 apps in two years, cutting production time by 66%. A Mendix-first strategy allowed faster, robust development. Read this case study to learn how BAE Systems achieved IT agility with low-code.
Posted: 03 Apr 2025 | Published: 03 Apr 2025
|
|
|
Saudi Arabia’s NCA OTCC-1:2022 Mandate for Industrial Control Systems
sponsored by Nozomi Networks
WHITE PAPER:
Saudi Arabia's NCA OTCC-1:2022 sets cybersecurity controls for industrial systems. The Nozomi Networks platform supports 11 of 13 subdomains in Cybersecurity Defense through automated asset discovery, network visibility, vulnerability management, and threat detection. Read the White Paper to see how Nozomi Networks aligns with Saudi mandates.
Posted: 12 Apr 2025 | Published: 12 Apr 2025
|
|
|
IDC MarketScape: Worldwide Emerging Managed Detection and Response Services 2024 Vendor Assessment
sponsored by LevelBlue
ANALYST REPORT:
This IDC MarketScape report examines the managed detection and response (MDR) services market, highlighting key capabilities and strategies of leading providers. It offers guidance for technology buyers to evaluate and select the right MDR partner. Read the full report to learn more.
Posted: 27 Aug 2024 | Published: 28 Aug 2024
|
All resources sponsored by LevelBlue
|
|
Cloud Infrastructure Wireless Airspace Defense
sponsored by Bastille
PRODUCT OVERVIEW:
Wireless threats can impact cloud infrastructure security, allowing data exfiltration and system disruption. This solution brief outlines how Bastille's comprehensive wireless monitoring and threat detection can defend your cloud infrastructure. Read the full brief to learn more.
Posted: 19 Feb 2025 | Published: 20 Feb 2025
|
|
|
Computer Weekly 50th anniversary special
sponsored by TechTarget ComputerWeekly.com
EZINE:
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 08 Feb 2021 | Published: 22 Sep 2016
|
|
|
MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE:
In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022
|
|
|
Leveraging Digital Manufacturing for Success in Aerospace and Defense
sponsored by Siemens
INFOGRAPHIC:
Digital manufacturing transformation is crucial for aerospace and defense manufacturers facing complex challenges. This infographic highlights six strategies for excellence. Explore the infographic view steps to success and to unpack the advantages of the Siemens Xcelerator portfolio, which helps drive first-time-right manufacturing.
Posted: 24 Apr 2025 | Published: 24 Apr 2025
|
|
|
KELYN Technologies and The Missile Defense Agency (MDA)
sponsored by Commvault
CASE STUDY:
This case study details KELYN Technologies' implementation of its KMDS solution for the Missile Defense Agency, replacing a cumbersome NetBackup system. Completed in 6 weeks instead of 6-12 months, it freed IT staff and improved data restoration times. Read the full case study to see how critical defense data is protected.
Posted: 10 Apr 2025 | Published: 10 Apr 2025
|
|
|
Deep Learning Delivers Proactive Cyber Defense
sponsored by Deep Instinct
ANALYST REPORT:
Amidst the cybersecurity skills shortage, organizations are hard pressed to find new answers to evolving problems. Deep learning, a subset of machine learning, offers a highly accurate way to identify attack patterns and stop threats before they become attacks, without the need for highly skilled cybersecurity experts. Read on to learn more.
Posted: 22 Feb 2023 | Published: 22 Feb 2023
|
|
|
Defending A Defense Contractor With A Compliant Unified Communications Solution
sponsored by ARG, Inc.
CASE STUDY:
A national, privately held defense contractor had previously leveraged Avaya on-prem PBX, Verizon PRIs and numerous collaboration and messaging tools (Teams, Slack, etc.) As many of these were disjointed, compliance risks arose. View this case study to learn how ARG helped this contractor aggregate tools and eliminate overlap.
Posted: 30 Jul 2021 | Published: 30 Jul 2021
|
All resources sponsored by ARG, Inc.
|
|
Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense
sponsored by ESET
WHITE PAPER:
This white paper explores the role of cyber threat intelligence in proactive defense strategies. It examines challenges, benefits of prevention-first approaches, and how ESET's Threat Intelligence solutions enhance security. Learn to leverage CTI for effective threat mitigation and risk reduction. Read the full white paper for insights.
Posted: 27 Feb 2025 | Published: 27 Feb 2025
|
|
|
Top 3 Risks For DIY Auth In Regulated Industries
sponsored by FusionAuth
WHITE PAPER:
This white paper examines the challenges of managing in-house authentication, particularly for regulated industries. It covers compliance, security, and the advantages of outsourcing. Discover how to select the right vendor and ensure a smooth transition. Read the full paper for insights on securing your organization's digital future.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021
|
|
|
ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT:
This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Zscaler ThreatLabz 2024 Phishing Report
sponsored by Zscaler
RESEARCH CONTENT:
Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Security Analytics:A popular addition to cyber defence arsenals
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.
Posted: 08 Feb 2021 | Published: 09 Oct 2017
|
|
|
AI Driven SOC Transformation with Cortex XSIAM
sponsored by Palo Alto Networks
WHITE PAPER:
As cyberattacks occur more quickly and more often, how can security operations centers (SOCs) keep up? Tap into this 21-page white paper to discover how 6 organizations transformed their SOC to boost their defenses in the evolving threat landscape.
Posted: 15 May 2024 | Published: 15 May 2024
|
|