
Architecting the security of the next-generation data centre - Why security needs to be a key component early in the design phase
Published: 9th August 2011 | By: Fran Howarth
This document is aimed at those looking at data centre builds, upgrades or consolidation. It provides an introduction to some of the new security challenges of such environments and provides recommendations for implementing security in next-generation dat

Taking back control in today’s complex threat landscape - using application and change control to thwart attackers
Published: 4th July 2011 | By: Fran Howarth
The security threats that we face are getting ever more harmful. Attacks launched en-masse are no longer the order of the day.

CA Database Management - for DB2 & IMS for z/OS
Published: 30th June 2011 | By: Philip Howard
It is clear from our discussions with AXA, CECA and Telefónica that these companies believe that CA Technologies offers significantly more functionality than is available from alternate suppliers.

Agile data management with X88
Published: 24th June 2011 | By: Philip Howard
This paper is a call for some more forward thinking from data management practitioners and vendors and a move towards a more agile stance.

Voice Data Security
Published: 27th May 2011 | By: Nigel Stanley
Anyone that conducts sensitive business using a cell phone should seriously consider implementing the preventative measures discussed in this paper.

Data Migration White Paper
Published: 23rd May 2011 | By: Philip Howard
This paper will discuss why data migration is important to your business and why the actual process of migration needs to be treated as a business issue.

Cluster Computing - gaining resilience and scalability without the costs
Published: 17th February 2011 | By: Philip Howard
In this paper we will describe the nuances of clusterbased technologies and the challenges in making clusters easier and simpler to work with.

What to consider when choosing a SaaS or cloud provider
Published: 15th February 2011 | By: Fran Howarth
This document is intended as a guide to aid organisations through the decision-making process when choosing a SaaS provider.

Data exchange and information sharing
Published: 8th February 2011 | By: Philip Howard
This paper is is about data exchange and the ability to share information.

Boosting the security of SaaS and web applications
Published: 7th February 2011 | By: Fran Howarth
By placing controls around which users and devices can access what information and what they can do with it, organisations will be able to identify and close security loopholes.