Taking back control in today’s complex threat landscape - using application and change control to thwart attackers
Published: 4th July 2011 | By: Fran Howarth
The security threats that we face are getting ever more harmful. Attacks launched en-masse are no longer the order of the day.
CA Database Management - for DB2 & IMS for z/OS
Published: 30th June 2011 | By: Philip Howard
It is clear from our discussions with AXA, CECA and Telefónica that these companies believe that CA Technologies offers significantly more functionality than is available from alternate suppliers.
Agile data management with X88
Published: 24th June 2011 | By: Philip Howard
This paper is a call for some more forward thinking from data management practitioners and vendors and a move towards a more agile stance.
Voice Data Security
Published: 27th May 2011 | By: Nigel Stanley
Anyone that conducts sensitive business using a cell phone should seriously consider implementing the preventative measures discussed in this paper.
Data Migration White Paper
Published: 23rd May 2011 | By: Philip Howard
This paper will discuss why data migration is important to your business and why the actual process of migration needs to be treated as a business issue.
Cluster Computing - gaining resilience and scalability without the costs
Published: 17th February 2011 | By: Philip Howard
In this paper we will describe the nuances of clusterbased technologies and the challenges in making clusters easier and simpler to work with.
What to consider when choosing a SaaS or cloud provider
Published: 15th February 2011 | By: Fran Howarth
This document is intended as a guide to aid organisations through the decision-making process when choosing a SaaS provider.
Data exchange and information sharing
Published: 8th February 2011 | By: Philip Howard
This paper is is about data exchange and the ability to share information.
Boosting the security of SaaS and web applications
Published: 7th February 2011 | By: Fran Howarth
By placing controls around which users and devices can access what information and what they can do with it, organisations will be able to identify and close security loopholes.
Solvency II: building the Internal Model
Published: 18th January 2011 | By: Philip Howard
Having considered the issues around the Internal Model we will briefly discuss the Solvency II solution offered by Netezza, Kalido and MicroStrategy.