White Papers


This page shows a subsection of our research library, filtered by papers in the White Paper category.

Cover image for Discovering data occurrence

Discovering data occurrence
By:

In this paper, we examine how to find occurrences of sensitive data and we consider the different techniques that are currently available.

Cover image for Proactive response - Improving efficiency and effectiveness with a security incident response platform

Proactive response - Improving efficiency and effectiveness with a security incident response platform
By:

In an era when security incidents and data breaches are everyday news, organisations are struggling to keep up their defences.

Cover image for Financial Performance Management in JD Edwards EnterpriseOne and World Environments

Financial Performance Management in JD Edwards EnterpriseOne and World Environments
By:

While the distinctive features of financial reporting are re-iterated (briefly) from the previous version of this paper the focus is on EPM.

Cover image for IBM Informix and the Internet of Things

IBM Informix and the Internet of Things
By:

This paper discusses the IBM Informix database and its suitability for deployment within Internet of Things (IoT) environments.

Cover image for TCO for Business Intelligence

TCO for Business Intelligence
By:

This paper initially started as an investigation into comparative pricing for BI solutions and then evolved into a consideration of TCO for such environments.

Cover image for Selling unsecure websites is not an option - why market dynamics are creating a new opportunity for hosting providers

Selling unsecure websites is not an option - why market dynamics are creating a new opportunity for hosting providers
By:

Website security is too important to ignore, especially when an organisation depends on it for its trade.

Cover image for DATUM - a 'value-driven' approach to building the digital enterprise

DATUM - a 'value-driven' approach to building the digital enterprise
By:

In this paper we will discuss why we believe that understanding the business value of data is fundamental to a successful digital transformation.

Cover image for Comparative costs and uses for Data Integration Platforms in Agile Enterprises

Comparative costs and uses for Data Integration Platforms in Agile Enterprises
By:

Data Integration should be at the heart of data architecture modernisation initiatives such as next generation analytics, application modernisation etc.

Cover image for Data protection in France

Data protection in France
By:

Currently, data controllers are responsible for data protection, not data processors, but that will change when the EU regulation comes into force.

Cover image for For the EU's new data protection regulation, encryption should bethe default option - and should be seen as a strategic partof the entire security system

For the EU's new data protection regulation, encryption should bethe default option - and should be seen as a strategic partof the entire security system
By:

This paper discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data.

Cover image for Hadoop Appliances and Teradata

Hadoop Appliances and Teradata
By:

This paper discusses the use of Hadoop-based appliances and then specific features of the Teradata Appliance for Hadoop.

Cover image for Automated testing: coping with change

Automated testing: coping with change
By:

Automated testing frameworks are not what they were even a couple of years ago.

Cover image for Security industry market trends

Security industry market trends
By:

This paper discusses trends in the security threat landscape and looks at how organisations are being affected.

Cover image for Financial Services Directives - Requirements for Data Technologies

Financial Services Directives - Requirements for Data Technologies
By: , Bob McDowall

The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.

Cover image for Application rationalisation, retirement and archiving: why and how?

Application rationalisation, retirement and archiving: why and how?
By:

In this paper we discuss how to approach application rationalisation and retirement, and related best practices.

Cover image for Supply Chain Management in the 21st century

Supply Chain Management in the 21st century
By:

Logistics is the management of the flow of goods between the point of origin and the point of consumption in order to meet some requirements of customers

Cover image for The need for active response to advanced threats - passive remediation is insufficient

The need for active response to advanced threats - passive remediation is insufficient
By:

Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.

Cover image for Defending against the rogue - unwanted users, devices and applications

Defending against the rogue - unwanted users, devices and applications
By:

Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.

Cover image for IBM: enhanced 360° view

IBM: enhanced 360° view
By:

IBM is in the vanguard for what it calls an enhanced 360° view and it is clearly well positioned to capitalise on the future growth of this market.

Cover image for Extending a 360° view

Extending a 360° view
By:

In this paper we will discuss why we believe that extending the traditional 360° view makes sense and we will give some uses that demonstrate why the extended it represents an opportunity.