skip to Main Content
Cover for The importance of performance to DevOps

The importance of performance to DevOps
Published: 18th July 2013 | By:
Production performance is not normally a functional requirement for application development projects but, in our minds, it should be.

Cover for Identity management services - bringing external services into the mix

Identity management services - bringing external services into the mix
Published: 26th March 2013 | By:
In the past four to five years, identity and access management technologies and services have seen considerable evolution and innovation.

Cover for Data Masking

Data Masking
Published: 3rd October 2012 | By:
In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.

Cover for People-Centric Security - adapt to the real-world needs of
workers, partners and customers

People-Centric Security - adapt to the real-world needs of workers, partners and customers
Published: 2nd May 2012 | By:
Taking a people-centric view of security allows controls to be placed around an individual's data.

Cover for Where is the Business? - Business intelligence empowered by location

Where is the Business? - Business intelligence empowered by location
Published: 23rd February 2012 | By:
Business intelligence supports decision-making but location shows you 'Where is the Business?'

Cover for Where is the Business? - Business intelligence empowered by location

Where is the Business? - Business intelligence empowered by location
Published: 22nd August 2011 | By:
Business intelligence supports decision-making but location shows you 'Where is the Business?'

Cover for Tools for Data Governance

Tools for Data Governance
Published: 9th June 2011 | By:
There is much work to be done in providing true data governance solutions. Both users and suppliers should take note.

Cover for Agile data management

Agile data management
Published: 31st May 2011 | By:
The environments in which data management rules are developed and tested in most organisations today are old-fashioned, time consuming and error prone.

Cover for The state of internet infrastructure security - ... a primer for organisations

The state of internet infrastructure security - ... a primer for organisations
Published: 19th May 2011 | By:
With cyberattacks escalating and becoming increasingly sophisticated and targeted, the race is on for organisations to ensure that their networks, the sensitive information that they contain and their valuable website resources are protected from compromi

Cover for Smartphone and mobile (cell) phone security - the new security frontier

Smartphone and mobile (cell) phone security - the new security frontier
Published: 22nd February 2011 | By:
The rise of the smartphone over the past few years has been a technology success story

Back To Top