skip to Main Content
Cover for Overcoming GDPR compliance challenges - steps to take and the pitfalls to avoid

Overcoming GDPR compliance challenges - steps to take and the pitfalls to avoid
Published: 11th April 2018 | By: and
The challenges and pitfalls involved in GDPR compliance and how to overcome them.

Cover for Overcoming the complexity gap - the role of automation in optimising network performance and security

Overcoming the complexity gap - the role of automation in optimising network performance and security
Published: 10th July 2017 | By:
This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...

Cover for Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware

Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware
Published: 10th July 2017 | By:
The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all stages of the cyber kill chain

Cover for Uniface: A low-code development disruptor - a modern visual development platform with provenance

Uniface: A low-code development disruptor - a modern visual development platform with provenance
Published: 28th November 2016 | By:
Uniface is a different kind of disruptor on the increasingly popular low-code development platform space.

Cover for The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance

The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance
Published: 29th September 2016 | By:
This document outlines how an integrated data protection platform can take the pain out of compliance, helping them to avoid data breaches.

Cover for The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services

The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services
Published: 27th September 2016 | By:
Endpoint security is a pressing concern for all organisations and is an area that is growing in importance.

Cover for How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern

How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern
Published: 29th January 2016 | By:
This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.

Cover for Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation

Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation
Published: 3rd August 2015 | By:
This document describes what options are available for disrupting attackers at each stage of the kill chain.

Cover for AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations

AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations
Published: 8th April 2015 | By:
Organisations will benefit from a unified, coordinated security monitoring capability encompassing many controls and traversing the entire network in a simplified manner.

Cover for Practices for Enhancing Data Security - a survey of organisations in the UK and the US

Practices for Enhancing Data Security - a survey of organisations in the UK and the US
Published: 23rd February 2015 | By:
This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.

Back To Top