BeyondTrust MAS TRM
Published: 11th July 2014 | By: Fran Howarth
The updated TRM Guidelines and associated legal notices that provide for sanctions in the case of non-compliance are intended to ensure that all financial...
Creating confidence in Big Data analytics
Published: 2nd June 2014 | By: Philip Howard
There has been some significant criticism of the concept of big data recently, notably in the Harvard Business Review criticising the Google Flu Trends...
Good information governance is good business practice - reduce risks, improve performance, collaborate securely and achieve compliance
Published: 27th May 2014 | By: Fran Howarth
This document discusses how technology enables more effective business collaboration and communications...
Understanding the real costs and benefits - of budgeting and planning solutions
Published: 12th May 2014 | By: Philip Howard
Bloor was asked by InsightSoftware.com to conduct a survey into the costs and benefits of different financial budgeting and planning solutions...
Rocket LegaSuite
Published: 28th April 2014 | By: David Norfolk
Rocket LegaSuite is a set of tools to facilitate modernisation of mainframe and midrange applications.
Managing Cyber Business Risk - with Content Assurance and Cyber Insurance
Published: 28th April 2014 | By: Nigel Stanley
Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...
Taking control of file sharing services - best practices for the safe and secure use of file sharing services for organisations
Published: 25th April 2014 | By: Fran Howarth
Careful planning is required when selecting any cloud service, especially file sharing which could leave sensitive and confidential data at risk.
IBM DB2 with BLU Acceleration onPower Systems: how it compares
Published: 25th April 2014 | By: Philip Howard
We consider the relative merits of IBM DB2 with BLU Acceleration running on Power Systems as compared to HANA, Exadata and SQL Server on x86-based platforms.
SAP ASE Total Cost of Ownership - A comparison to Oracle
Published: 7th April 2014 | By: Philip Howard
This paper is focused on a comparison between SAP ASE and Oracle, helping customers to understand the potential TCO benefits of using SAP ASE.
Document Content Security
Published: 25th March 2014 | By: Fran Howarth
Documents are key weapons used in advanced targeted attacks, which are fast growing in popularity among criminals.