From Insight to Action - How Decision-Making Platforms are Changing the Game
Published: 20th June 2018 | By: David Norris
A look at how by combining CPM and BI capability, Board International offers insight that separate technologies cannot match.
Overcoming GDPR compliance challenges - steps to take and the pitfalls to avoid
Published: 11th April 2018 | By: Fran Howarth and David Norfolk
The challenges and pitfalls involved in GDPR compliance and how to overcome them.
Overcoming the complexity gap - the role of automation in optimising network performance and security
Published: 10th July 2017 | By: Fran Howarth
This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...
Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware
Published: 10th July 2017 | By: Fran Howarth
The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all
stages of the cyber kill chain
Uniface: A low-code development disruptor - a modern visual development platform with provenance
Published: 28th November 2016 | By: David Norfolk
Uniface is a different kind of disruptor on the increasingly popular low-code development platform space.
The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance
Published: 29th September 2016 | By: Fran Howarth
This document outlines how an integrated data protection platform can take the pain out of compliance, helping them to avoid data breaches.
The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services
Published: 27th September 2016 | By: Fran Howarth
Endpoint security is a pressing concern for all organisations and is an area that is growing in importance.
How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern
Published: 29th January 2016 | By: Fran Howarth
This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.
Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation
Published: 3rd August 2015 | By: Fran Howarth
This document describes what options are available for disrupting attackers at each stage of the kill chain.
AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations
Published: 8th April 2015 | By: Fran Howarth
Organisations will benefit from a unified, coordinated security monitoring capability encompassing many controls and traversing the entire network in a simplified manner.