![Cover for From Insight to Action - How Decision-Making Platforms are Changing the Game](https://www.bloorresearch.com/wp-content/uploads/edd/2018/06/00002358-BOARD-How-Decision-Making-Actions-are-Changing-the-Game-cover.jpg)
From Insight to Action - How Decision-Making Platforms are Changing the Game
Published: 20th June 2018 | By: David Norris
A look at how by combining CPM and BI capability, Board International offers insight that separate technologies cannot match.
![Cover for Overcoming GDPR compliance challenges - steps to take and the pitfalls to avoid](https://www.bloorresearch.com/wp-content/uploads/edd/2018/04/Overcoming-GDPR-compliance-challenges.jpg)
Overcoming GDPR compliance challenges - steps to take and the pitfalls to avoid
Published: 11th April 2018 | By: Fran Howarth and David Norfolk
The challenges and pitfalls involved in GDPR compliance and how to overcome them.
![Cover for Overcoming the complexity gap - the role of automation in optimising network performance and security](https://www.bloorresearch.com/wp-content/uploads/2017/07/cover-overcoming-the-complexity-gap-12325.jpg)
Overcoming the complexity gap - the role of automation in optimising network performance and security
Published: 10th July 2017 | By: Fran Howarth
This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...
![Cover for Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware](https://www.bloorresearch.com/wp-content/uploads/2017/07/cover-evolving-uses-of-the-kill-chain-framework-12322.jpg)
Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware
Published: 10th July 2017 | By: Fran Howarth
The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all
stages of the cyber kill chain
![Cover for Uniface: A low-code development disruptor - a modern visual development platform with provenance](https://www.bloorresearch.com/wp-content/uploads/2016/11/cover-uniface-a-low-code-development-disruptor-12256.jpg)
Uniface: A low-code development disruptor - a modern visual development platform with provenance
Published: 28th November 2016 | By: David Norfolk
Uniface is a different kind of disruptor on the increasingly popular low-code development platform space.
![Cover for The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance](https://www.bloorresearch.com/wp-content/uploads/2016/09/cover-the-importance-of-a-data-protection-platform-for-gdpr-compliance-12229.jpg)
The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance
Published: 29th September 2016 | By: Fran Howarth
This document outlines how an integrated data protection platform can take the pain out of compliance, helping them to avoid data breaches.
![Cover for The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services](https://www.bloorresearch.com/wp-content/uploads/2016/09/cover-the-promise-of-managed-endpoint-security-12226.jpg)
The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services
Published: 27th September 2016 | By: Fran Howarth
Endpoint security is a pressing concern for all organisations and is an area that is growing in importance.
![Cover for How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern](https://www.bloorresearch.com/wp-content/uploads/2016/01/cover-how-to-raise-your-organisation-s-security-maturity-level-12175.jpg)
How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern
Published: 29th January 2016 | By: Fran Howarth
This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.
![Cover for Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation](https://www.bloorresearch.com/wp-content/uploads/2015/08/cover-turning-the-tables-on-cyber-criminals-12118.jpg)
Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation
Published: 3rd August 2015 | By: Fran Howarth
This document describes what options are available for disrupting attackers at each stage of the kill chain.
![Cover for AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations](https://www.bloorresearch.com/wp-content/uploads/2015/04/cover-alienvault-unified-security-management-system-usm-12088.jpg)
AlienVault Unified Security Management System (USM) - ... designed for the needs of mid-market organisations
Published: 8th April 2015 | By: Fran Howarth
Organisations will benefit from a unified, coordinated security monitoring capability encompassing many controls and traversing the entire network in a simplified manner.