management

April 23, 2016

Data management: Five decades of prospecting for business value

Data management and business intelligence have been at the heart of business value creation for decades. Read about how Computer Weekly has tracked their promise and […]
March 10, 2016

Management overhead frustrates organisations’ digital ambitions, says Capita study

Many UK business are in no position to roll out Windows 10 and are concerned about supporting diverse IT estates with their existing infrastructure ComputerWeekly: Latest […]
December 30, 2015

Top 10 information management stories of 2015

The maturing of big data technologies such as Hadoop, Spark and NoSQL databases has been the standout theme of 2015, along with machine learning and predictive […]
November 4, 2015

1248 trials IoT device management platform

Internet of things (IoT) specialist 1248 plans to unveil a service to help businesses manage and maximise value from their IoT deployments ComputerWeekly: Latest IT News
October 3, 2015

Enterprise Mobility Management Smackdown

Are you looking for an independent overview of the Enterprise Mobility Management (EMM) solutions and curious about the different features and functions each EMM vendor is […]
August 17, 2015

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls

A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably – so it’s easy to get confused about which […]
August 4, 2015

Enterprise Mobility Management Buyers Guide

This EMM buyers guide will walk you through the process of selecting the right mobile solution to fit your company’s BYOD objectives. It explains how an […]
July 28, 2015

Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the […]
July 6, 2015

Security Think Tank: Guidelines to enable security to get the most out of log management

How can log management be used to bolster information security and improve incident response without infringing end user privacy? ComputerWeekly: Latest IT News