Application rationalisation, retirement and archiving: why and how?
Published: 13th January 2015 | By: Philip Howard
In this paper we discuss how to approach application rationalisation and retirement, and related best practices.
Financial Services Directives - Requirements for Data Technologies
Published: 13th January 2015 | By: Philip Howard and Bob McDowall
The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.
The need for active response to advanced threats - passive remediation is insufficient
Published: 20th November 2014 | By: Fran Howarth
Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.
Defending against the rogue - unwanted users, devices and applications
Published: 28th October 2014 | By: Fran Howarth
Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.
Good information governance is good business practice - reduce risks, improve performance, collaborate securely and achieve compliance
Published: 27th May 2014 | By: Fran Howarth
This document discusses how technology enables more effective business collaboration and communications...
Taking control of file sharing services - best practices for the safe and secure use of file sharing services for organisations
Published: 25th April 2014 | By: Fran Howarth
Careful planning is required when selecting any cloud service, especially file sharing which could leave sensitive and confidential data at risk.
SAP ASE Total Cost of Ownership - A comparison to Oracle
Published: 7th April 2014 | By: Philip Howard
This paper is focused on a comparison between SAP ASE and Oracle, helping customers to understand the potential TCO benefits of using SAP ASE.