skip to Main Content
Cover for The need for active response to advanced threats - passive remediation is insufficient

The need for active response to advanced threats - passive remediation is insufficient
Published: 20th November 2014 | By:
Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.

Cover for Defending against the rogue - unwanted users, devices and applications

Defending against the rogue - unwanted users, devices and applications
Published: 28th October 2014 | By:
Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.

Cover for IBM: enhanced 360° view

IBM: enhanced 360° view
Published: 22nd September 2014 | By:
IBM is in the vanguard for what it calls an enhanced 360° view and it is clearly well positioned to capitalise on the future growth of this market.

Cover for Extending a 360° view

Extending a 360° view
Published: 17th September 2014 | By:
In this paper we will discuss why we believe that extending the traditional 360° view makes sense and we will give some uses that demonstrate why the extended it represents an opportunity.

Cover for Creating confidence in Big Data analytics

Creating confidence in Big Data analytics
Published: 2nd June 2014 | By:
There has been some significant criticism of the concept of big data recently, notably in the Harvard Business Review criticising the Google Flu Trends...

Cover for Good information governance is good business practice - reduce risks, improve performance, collaborate securely and achieve compliance

Good information governance is good business practice - reduce risks, improve performance, collaborate securely and achieve compliance
Published: 27th May 2014 | By:
This document discusses how technology enables more effective business collaboration and communications...

Cover for Taking control of file sharing services - best practices for the safe and secure use of file sharing services for organisations

Taking control of file sharing services - best practices for the safe and secure use of file sharing services for organisations
Published: 25th April 2014 | By:
Careful planning is required when selecting any cloud service, especially file sharing which could leave sensitive and confidential data at risk.

Cover for SAP ASE Total Cost of Ownership - A comparison to Oracle

SAP ASE Total Cost of Ownership - A comparison to Oracle
Published: 7th April 2014 | By:
This paper is focused on a comparison between SAP ASE and Oracle, helping customers to understand the potential TCO benefits of using SAP ASE.

Cover for CA Application Quality Management and Testing Tools

CA Application Quality Management and Testing Tools
Published: 13th March 2014 | By:
CA Technologies has convinced us that it has a particularly strong commitment to supporting, modernising and extending the mainframe platform.

Cover for Approximate Query Processing

Approximate Query Processing
Published: 24th February 2014 | By:
This paper examines approximate query processing (AQP) as an approach to particular types of query where approximations are appropriate.

Back To Top