skip to Main Content
Cover for Smartphone and mobile (cell) phone security - the new security frontier

Smartphone and mobile (cell) phone security - the new security frontier
Published: 22nd February 2011 | By:
The rise of the smartphone over the past few years has been a technology success story

Cover for The changing nature of US healthcare delivery - reform, regulation and technology investments

The changing nature of US healthcare delivery - reform, regulation and technology investments
Published: 9th December 2010 | By:
This document outlines the challenges faced in the healthcare sector in the US today, including the latest reforms and regulations being put in place to modernize it and improve efficiencies.

Cover for Optimising security in the enterprise - moving from reactive to optimised network security

Optimising security in the enterprise - moving from reactive to optimised network security
Published: 13th October 2010 | By:
Organisations should investigate the options that are available in terms of an optimised network security platform, with centralised management capabilities and backed up by global threat intelligence services based in the cloud.

Cover for Voice Data Security - An overview of cellular (mobile) phone interception

Voice Data Security - An overview of cellular (mobile) phone interception
Published: 2nd August 2010 | By:
Anyone conducting sensitive business using a cell phone should seriously consider implementing the preventative measures in this paper.

Cover for Operational Data Quality

Operational Data Quality
Published: 22nd June 2010 | By:
This paper is organised into two parts. We will discuss the importance of operational data quality in various scenarios and consider the technical requirements.

Cover for Windows 7 Enterprise: what are you actually getting? - ... when

Windows 7 Enterprise: what are you actually getting? - ... when
Published: 16th June 2010 | By:
Windows 7 is the latest operating system from Microsoft, released in late 2009.

Cover for Efforts to improve data security in the local government sector - ... expanded use of strong authentication and cloud offerings

Efforts to improve data security in the local government sector - ... expanded use of strong authentication and cloud offerings
Published: 7th June 2010 | By:
Local authorities handle a substantial amount of sensitive information related to individuals. Holding this information poses a wide range of risks.

Cover for Enabling Advanced Analytics

Enabling Advanced Analytics
Published: 26th April 2010 | By:
There is significant value to be derived from advanced analytics and its implementation in-database.

Cover for Social Networking for Business - Its Increasing Relevance

Social Networking for Business - Its Increasing Relevance
Published: 1st March 2010 | By:
Social networking has value for businesses. This report identifies the drivers and likely benefits.

Cover for Database Activity Monitoring

Database Activity Monitoring
Published: 26th February 2010 | By:
By adding an intelligent monitor capable of sniffing out threats an additional level of protection can be gained.

Back To Top