skip to Main Content
Cover for The many flavours of threat detection and response

The many flavours of threat detection and response
Published: 15th September 2022 | By:
This Spotlight explores the landscape for threat detection and response technologies and services. Read through it to decide what best suits your organisation.

Cover for The promise of NDR - Network detection and response becoming mainstream

The promise of NDR - Network detection and response becoming mainstream
Published: 18th March 2022 | By:
This Spotlight report explains what NDR is and how it works and its usefulness for a wide range of organisations.

Cover for The ethics of sensitive data and Solix Technologies

The ethics of sensitive data and Solix Technologies
Published: 10th March 2022 | By:
Increased privacy regulation and public awareness have made it more important than ever to handle sensitive data ethically. But what does that mean in practice?

Cover for Ingres NeXt Database and Application Modernisation

Ingres NeXt Database and Application Modernisation
Published: 13th January 2022 | By:
This report discusses Ingres NeXt, Actian’s flexible and comprehensive approach to digital transformation through database and application modernisation.

Cover for Refactoring Monolithic Systems - An emerging business issue

Refactoring Monolithic Systems - An emerging business issue
Published: 19th November 2021 | By:
Business-oriented modernisation of ES-3 (eg IBM Websphere mainframe) applications as microservices using AI tools such as Mono2Micro.

Cover for Disrupters in the Privilege Management Market

Disrupters in the Privilege Management Market
Published: 23rd April 2021 | By:
Over the past few years, a raft of new, innovative vendors have sprung up to disrupt the privilege management market.

Cover for Privilege Management - Protection for what you need the most… putting identity on the frontline

Privilege Management - Protection for what you need the most… putting identity on the frontline
Published: 20th April 2021 | By:
In the field of identity management, managing privileges assigned should be a very high priority. Stealing credentials is a top tactic for attackers.

Cover for Automation Excellence

Automation Excellence
Published: 31st March 2021 | By:
The World Economic Forum has characterized AI driven automation as the lynchpin of a Fourth Industrial Revolution.

Cover for Moving to a hybrid multi-cloud platform - Assuring the success of the journey

Moving to a hybrid multi-cloud platform - Assuring the success of the journey
Published: 4th March 2021 | By: and
Embrace hybrid multi-cloud, but embed assurance intelligence in the infrastructure. Paul Bevan and David Norfolk explore in this Spotlight.

Cover for Data for everyone: treating data as an asset

Data for everyone: treating data as an asset
Published: 23rd November 2020 | By:
Data is not the only contributor to digital transformation, but it is a key asset that can enable those transformations.

Back To Top