CA Technologies – Agile Testing Solutions
Published: 29th January 2016 | By: Philip Howard
Over the last several years CA Technologies has acquired a number of companies and their respective products, to augment its continuous delivery suite.
For the EU’s new data protection regulation, encryption should be the default option - and should be seen as a strategic partof the entire security system
Published: 10th November 2015 | By: Fran Howarth
This paper discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data.
Hadoop Appliances and Teradata
Published: 19th October 2015 | By: Philip Howard
This paper discusses the use of Hadoop-based appliances and then specific features of the Teradata Appliance for Hadoop.
Automated testing: coping with change
Published: 31st May 2015 | By: Philip Howard
Automated testing frameworks are not what they were even a couple of years ago.
Security industry market trends
Published: 13th April 2015 | By: Fran Howarth
This paper discusses
trends in the security threat landscape and looks at how organisations are
being affected.
Application rationalisation, retirement and archiving: why and how?
Published: 13th January 2015 | By: Philip Howard
In this paper we discuss how to approach application rationalisation and retirement, and related best practices.
Financial Services Directives - Requirements for Data Technologies
Published: 13th January 2015 | By: Philip Howard and Bob McDowall
The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.
The need for active response to advanced threats - passive remediation is insufficient
Published: 20th November 2014 | By: Fran Howarth
Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.
Defending against the rogue - unwanted users, devices and applications
Published: 28th October 2014 | By: Fran Howarth
Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.