Whitepaper archive
July 2023
Filter
Go
51 articles
- July 24
- July 17
- July 14
-
- When banking works, the world works
- Automating digital resiliency in banking
- Six ways to recession-proof your business with ServiceNow risk products
- Choosing the right technology to strengthen cloud security and risk management
- Anticipate, prevent, and minimize the impact of business disruptions
- Business value of ServiceNow security operations
- Thwart cyberthreats fast with security operations + AI Ops
- Three steps to transforming security operations
- Top ten ways to anticipate, eliminate, and defeat cyber threats like a boss
- Six steps to a stronger security posture through automation
- Automation antidotes for the top poisons in cyber security management
- A prudent approach to major security incidents
- Cybercriminals are resilient. How about you?
- July 12
-
- Everest Group PEAK matrix for Salesforce industry cloud service provider 2023
- The key requirements of modernization and the role of IBM Power10
- The power of IBM Power for SAP HANA and SAP S/4HANA environments
- ITIC 2022 Global Server Hardware, Server OS Security Report
- Application performance management for microservice applications on Kubernetes
- Gaining observability in cloud native applications
- Definitive guide to practical AIOps
- Driving disruptive value with Generative AI
- Definitive guide to ransomware 2023
- July 11
-
- Sustainability at scale, accelerated by data
- An EDR buyer's guide
- The Forrester Wave™: API management solutions
- Accelerating FinOps & sustainable IT
- Automating application-driven container elasticity
- Magic quadrant for Security Information and Event Management (SIEM)
- Observability in pre-production testing
- Observability for developers
- The state of Salesforce 2022-2023
- The Total Economic Impact™ Of Turbonomic Application Resource Management
- Six myths of SIEM
- The business value of IBM AI-powered automation solutions
- Big payoffs from big bets in AI-powered automation
- The five pillars of personalization at scale
- Implementing sustainable storage infrastructure
- The ultimate guide to 3D
- Developing an end-to-end process for virtual photography
- Welcome to the 3D Generation: Unleash your creativity
- End to end 3D design and styling
- The 3D skills report
- July 10
-
- Threat Intelligence: Critical in the fight against cyber attacks, but tough to master
- AI and cyber security
- State of ransomware readiness 2022
- The board's evolving perceptions of cyber risk
- The state of email security 2023
- Don’t just educate: Create cyber-safe behaviour
- Defence in depth: Closing the gaps in Microsoft 365 security
- 2025
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019