Tools for Data Migration
Published: 12th September 2013 | By: Philip Howard
This paper discusses the various types of tools that may or should be used to support successful data migrations.
The importance of performance to DevOps
Published: 18th July 2013 | By: Philip Howard
Production performance is not normally a functional requirement for application development projects but, in our minds, it should be.
Identity management services - bringing external services into the mix
Published: 26th March 2013 | By: Fran Howarth
In the past four to five years, identity and access management technologies and services have seen considerable evolution and innovation.
Data Masking
Published: 3rd October 2012 | By: Philip Howard
In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.
People-Centric Security - adapt to the real-world needs of
workers, partners and customers
Published: 2nd May 2012 | By: Fran Howarth
Taking a people-centric view of security allows controls to be placed around an individual's data.
Where is the Business? - Business intelligence empowered by location
Published: 23rd February 2012 | By: Natalie Newman
Business intelligence supports decision-making but location shows you 'Where is the Business?'
Where is the Business? - Business intelligence empowered by location
Published: 22nd August 2011 | By: Natalie Newman
Business intelligence supports decision-making but location shows you 'Where is the Business?'
Tools for Data Governance
Published: 9th June 2011 | By: Philip Howard
There is much work to be done in providing true data governance solutions. Both users and suppliers should take note.
Agile data management
Published: 31st May 2011 | By: Philip Howard
The environments in which data management rules are developed and tested in most organisations today are old-fashioned, time consuming and error prone.
The state of internet infrastructure security - ... a primer for organisations
Published: 19th May 2011 | By: Fran Howarth
With cyberattacks escalating and becoming increasingly sophisticated and targeted, the race is on for organisations to ensure that their networks, the sensitive information that they contain and their valuable website resources are protected from compromi