Edge Computing
Published: 25th August 2022 | By: Paul Bevan
Edge computing brings computation, data, storage and power closer to the point of action or event, reducing latency and saving bandwidth
Edge Network Interconnection Platforms
Published: 29th April 2020 | By: Paul Bevan
A secure, managed platform that enables connectivity from Edge locations to the Cloud or other specific public sector and enterprise networks.
Hybrid Infrastructure Management
Published: 1st March 2020 | By: Paul Bevan
Hybrid Infrastructure Management solutions will enable I.T. to deliver availability & performance SLAs, even on cloud-based infrastructure that may not be directly under its control.
Blockchain
Published: 7th February 2019 | By: David Terrar
Hot Report explaining Blockchain distributed ledger technology benefits business model use cases and why you should skill up and include in your strategy now.
Predictive and Prescriptive Analytics
Published: 1st February 2019 | By: Philip Howard
Predictive analytics refers to the ability to predict events before they occur, allowing you to take remedial action in advance. Prescriptive analytics extends this concept by either suggesting the actions you should take or automating those actions.
Machine Learning and Artificial Intelligence
Published: 29th January 2019 | By: Philip Howard
How does ML/AI work, who are the vendors and why you should care?
Endpoint detection and response
Published: 7th December 2018 | By: Fran Howarth
EDR supplements traditional endpoint protection by providing capabilities for threat detection and response, going beyond a traditional focus on threat prevention and protection.
Security Response Orchestration
Published: 5th December 2018 | By: Fran Howarth
Security response orchestration enables automated incident response when appropriate, augmented with human knowledge for better-informed decision making.
User and Entity Behavioural Analytics
Published: 5th December 2018 | By: Fran Howarth
UEBA technologies focus on identifying patterns of activity that are outside of the normal patterns expected in order to identify activity that could be suspicious or clearly malicious.
Encryption
Published: 7th November 2018 | By: Fran Howarth
Why encryption is getting a new lease of life and should be the default option for securing sensitive data.