skip to Main Content
Cover for Taking back control in today’s complex threat landscape - using application and change control to thwart attackers

Taking back control in today’s complex threat landscape - using application and change control to thwart attackers
Published: 4th July 2011 | By:
The security threats that we face are getting ever more harmful. Attacks launched en-masse are no longer the order of the day.

Cover for CA Database Management -  for DB2 & IMS for z/OS

CA Database Management - for DB2 & IMS for z/OS
Published: 30th June 2011 | By:
It is clear from our discussions with AXA, CECA and Telefónica that these companies believe that CA Technologies offers significantly more functionality than is available from alternate suppliers.

Cover for Agile data management with X88

Agile data management with X88
Published: 24th June 2011 | By:
This paper is a call for some more forward thinking from data management practitioners and vendors and a move towards a more agile stance.

Cover for Voice Data Security

Voice Data Security
Published: 27th May 2011 | By:
Anyone that conducts sensitive business using a cell phone should seriously consider implementing the preventative measures discussed in this paper.

Cover for Data Migration White Paper

Data Migration White Paper
Published: 23rd May 2011 | By:
This paper will discuss why data migration is important to your business and why the actual process of migration needs to be treated as a business issue.

Cover for Cluster Computing - gaining resilience and scalability without the costs

Cluster Computing - gaining resilience and scalability without the costs
Published: 17th February 2011 | By:
In this paper we will describe the nuances of clusterbased technologies and the challenges in making clusters easier and simpler to work with.

Cover for What to consider when choosing a SaaS or cloud provider

What to consider when choosing a SaaS or cloud provider
Published: 15th February 2011 | By:
This document is intended as a guide to aid organisations through the decision-making process when choosing a SaaS provider.

Cover for Data exchange and information sharing

Data exchange and information sharing
Published: 8th February 2011 | By:
This paper is is about data exchange and the ability to share information.

Cover for Boosting the security of SaaS and web applications

Boosting the security of SaaS and web applications
Published: 7th February 2011 | By:
By placing controls around which users and devices can access what information and what they can do with it, organisations will be able to identify and close security loopholes.

Cover for Solvency II: building the Internal Model

Solvency II: building the Internal Model
Published: 18th January 2011 | By:
Having considered the issues around the Internal Model we will briefly discuss the Solvency II solution offered by Netezza, Kalido and MicroStrategy.

Back To Top