skip to Main Content
Cover for Blended security threats need a unified response - the need for an integrated, cloud-based threat vector management platform

Blended security threats need a unified response - the need for an integrated, cloud-based threat vector management platform
Published: 25th June 2013 | By:
Security threats are becoming increasingly complex, sophisticated and targeted and no organisation is immune.

Cover for Master Data Management

Master Data Management
Published: 3rd June 2013 | By:
Master data management has been something of a slow burner but it has now reached the stage that it is a mainstream activity.

Cover for Exploiting the Internet of Things with investigative analytics

Exploiting the Internet of Things with investigative analytics
Published: 22nd May 2013 | By:
In this paper we will explore some of the use cases around investigative analysis and how that can be applied to the Internet of Things.

Cover for Lower your risk with application data migration - next steps with Informatica

Lower your risk with application data migration - next steps with Informatica
Published: 22nd April 2013 | By:
In this paper we will review what Bloor Research has learned over the past six years, since we first published our original Data Migration Survey in 2007.

Cover for Getting ahead in the cloud - ...the need for better identity and access controls

Getting ahead in the cloud - ...the need for better identity and access controls
Published: 11th March 2013 | By:
This paper discusses recent developments in identity and access management technologies for cloud-based applications.

Cover for Harnessing big data for security - what are the key considerations and capabilities?

Harnessing big data for security - what are the key considerations and capabilities?
Published: 12th February 2013 | By:
This report discusses some of the challenges of harnessing big data security and outlines some of the key considerations and capabilities that organisations should consider.

Cover for Key considerations for security intelligence in big data - what a CISO needs to know

Key considerations for security intelligence in big data - what a CISO needs to know
Published: 12th February 2013 | By:
This document discusses the need for an intelligence-driven security approach and aims to provide pointers for security executives.

Cover for Database performance management - the importance of time-based analysis

Database performance management - the importance of time-based analysis
Published: 6th February 2013 | By:
This paper discusses the various issues that surround database performance monitoring and how we believe that they should be addressed

Cover for The value of big data in security - leveraging big data for intelligence-led security

The value of big data in security - leveraging big data for intelligence-led security
Published: 11th December 2012 | By:
This paper discusses the benefits that implementing a security intelligence platform can bring and discusses the essential components that organisations should look for when selecting a system.

Cover for Atego Asset Library

Atego Asset Library
Published: 16th November 2012 | By:
Storing system and software engineering artefacts for large-scale reuse.

Back To Top