
Managing indicators of compromise - taking a more proactive stance on security breach remediation
Published: 11th October 2013 | By: Fran Howarth
This document introduces the concept of IOCs and explains how organisations can use them for their benefit.

Tools for Data Migration
Published: 12th September 2013 | By: Philip Howard
This paper discusses the various types of tools that may or should be used to support successful data migrations.

The importance of performance to DevOps
Published: 18th July 2013 | By: Philip Howard
Production performance is not normally a functional requirement for application development projects but, in our minds, it should be.

Identity management services - bringing external services into the mix
Published: 26th March 2013 | By: Fran Howarth
In the past four to five years, identity and access management technologies and services have seen considerable evolution and innovation.

Data Masking
Published: 3rd October 2012 | By: Philip Howard
In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.

People-Centric Security - adapt to the real-world needs of
workers, partners and customers
Published: 2nd May 2012 | By: Fran Howarth
Taking a people-centric view of security allows controls to be placed around an individual's data.

Where is the Business? - Business intelligence empowered by location
Published: 23rd February 2012 | By: Natalie Newman
Business intelligence supports decision-making but location shows you 'Where is the Business?'

Where is the Business? - Business intelligence empowered by location
Published: 22nd August 2011 | By: Natalie Newman
Business intelligence supports decision-making but location shows you 'Where is the Business?'

Tools for Data Governance
Published: 9th June 2011 | By: Philip Howard
There is much work to be done in providing true data governance solutions. Both users and suppliers should take note.

Agile data management
Published: 31st May 2011 | By: Philip Howard
The environments in which data management rules are developed and tested in most organisations today are old-fashioned, time consuming and error prone.