Taking back control in today’s complex threat landscape - using application and change control to thwart attackers
Published: 4th July 2011 | By: Fran Howarth
The security threats that we face are getting ever more harmful. Attacks launched en-masse are no longer the order of the day.
Sybase IQ 15.3
Published: 30th June 2011 | By: Philip Howard
Sybase IQ is a column-based relational database that has been designed specifically for analytics and business intelligence applications.
CA Database Management - for DB2 & IMS for z/OS
Published: 30th June 2011 | By: Philip Howard
It is clear from our discussions with AXA, CECA and Telefónica that these companies believe that CA Technologies offers significantly more functionality than is available from alternate suppliers.
Agile data management with X88
Published: 24th June 2011 | By: Philip Howard
This paper is a call for some more forward thinking from data management practitioners and vendors and a move towards a more agile stance.
Composite Data Virtualization Platform
Published: 13th June 2011 | By: Philip Howard
Data virtualisation is now a mainstream technology with a significant number of major organisations employing it for a variety of purposes.
Tools for Data Governance
Published: 9th June 2011 | By: Philip Howard
There is much work to be done in providing true data governance solutions. Both users and suppliers should take note.
Agile data management
Published: 31st May 2011 | By: Philip Howard
The environments in which data management rules are developed and tested in most organisations today are old-fashioned, time consuming and error prone.
Voice Data Security
Published: 27th May 2011 | By: Nigel Stanley
Anyone that conducts sensitive business using a cell phone should seriously consider implementing the preventative measures discussed in this paper.
Data Migration White Paper
Published: 23rd May 2011 | By: Philip Howard
This paper will discuss why data migration is important to your business and why the actual process of migration needs to be treated as a business issue.
The state of internet infrastructure security - ... a primer for organisations
Published: 19th May 2011 | By: Fran Howarth
With cyberattacks escalating and becoming increasingly sophisticated and targeted, the race is on for organisations to ensure that their networks, the sensitive information that they contain and their valuable website resources are protected from compromi