skip to Main Content
Cover for Tools for Data Governance

Tools for Data Governance
Published: 9th June 2011 | By:
There is much work to be done in providing true data governance solutions. Both users and suppliers should take note.

Cover for Agile data management

Agile data management
Published: 31st May 2011 | By:
The environments in which data management rules are developed and tested in most organisations today are old-fashioned, time consuming and error prone.

Cover for The state of internet infrastructure security - ... a primer for organisations

The state of internet infrastructure security - ... a primer for organisations
Published: 19th May 2011 | By:
With cyberattacks escalating and becoming increasingly sophisticated and targeted, the race is on for organisations to ensure that their networks, the sensitive information that they contain and their valuable website resources are protected from compromi

Cover for Smartphone and mobile (cell) phone security - the new security frontier

Smartphone and mobile (cell) phone security - the new security frontier
Published: 22nd February 2011 | By:
The rise of the smartphone over the past few years has been a technology success story

Cover for The changing nature of US healthcare delivery - reform, regulation and technology investments

The changing nature of US healthcare delivery - reform, regulation and technology investments
Published: 9th December 2010 | By:
This document outlines the challenges faced in the healthcare sector in the US today, including the latest reforms and regulations being put in place to modernize it and improve efficiencies.

Cover for Optimising security in the enterprise - moving from reactive to optimised network security

Optimising security in the enterprise - moving from reactive to optimised network security
Published: 13th October 2010 | By:
Organisations should investigate the options that are available in terms of an optimised network security platform, with centralised management capabilities and backed up by global threat intelligence services based in the cloud.

Cover for Voice Data Security - An overview of cellular (mobile) phone interception

Voice Data Security - An overview of cellular (mobile) phone interception
Published: 2nd August 2010 | By:
Anyone conducting sensitive business using a cell phone should seriously consider implementing the preventative measures in this paper.

Cover for Operational Data Quality

Operational Data Quality
Published: 22nd June 2010 | By:
This paper is organised into two parts. We will discuss the importance of operational data quality in various scenarios and consider the technical requirements.

Cover for Windows 7 Enterprise: what are you actually getting? - ... when

Windows 7 Enterprise: what are you actually getting? - ... when
Published: 16th June 2010 | By:
Windows 7 is the latest operating system from Microsoft, released in late 2009.

Cover for Efforts to improve data security in the local government sector - ... expanded use of strong authentication and cloud offerings

Efforts to improve data security in the local government sector - ... expanded use of strong authentication and cloud offerings
Published: 7th June 2010 | By:
Local authorities handle a substantial amount of sensitive information related to individuals. Holding this information poses a wide range of risks.

Back To Top