The many flavours of threat detection and response
Published: 15th September 2022 | By: Fran Howarth
This Spotlight explores the landscape for threat detection and response technologies and services. Read through it to decide what best suits your organisation.
The promise of NDR - Network detection and response becoming mainstream
Published: 18th March 2022 | By: Fran Howarth
This Spotlight report explains what NDR is and how it works and its usefulness for a wide range of organisations.
The ethics of sensitive data and Solix Technologies
Published: 10th March 2022 | By: Daniel Howard
Increased privacy regulation and public awareness have made it more important than ever to handle sensitive data ethically. But what does that mean in practice?
Ingres NeXt Database and Application Modernisation
Published: 13th January 2022 | By: Daniel Howard
This report discusses Ingres NeXt, Actian’s flexible and comprehensive approach to digital transformation through database and application modernisation.
Refactoring Monolithic Systems - An emerging business issue
Published: 19th November 2021 | By: David Norfolk
Business-oriented modernisation of ES-3 (eg IBM Websphere mainframe) applications as microservices using AI tools such as Mono2Micro.
Privilege Management - Protection for what you need the most… putting identity on the frontline
Published: 20th April 2021 | By: Fran Howarth
In the field of identity management, managing privileges assigned should be a very high priority. Stealing credentials is a top tactic for attackers.
Moving to a hybrid multi-cloud platform - Assuring the success of the journey
Published: 4th March 2021 | By: Paul Bevan and David Norfolk
Embrace hybrid multi-cloud, but embed assurance intelligence in the infrastructure. Paul Bevan and David Norfolk explore in this Spotlight.