skip to Main Content
Cover for CA Technologies – Agile Testing Solutions

CA Technologies – Agile Testing Solutions
Published: 29th January 2016 | By:
Over the last several years CA Technologies has acquired a number of companies and their respective products, to augment its continuous delivery suite.

Cover for For the EU’s new data protection regulation, encryption should be the default option - and should be seen as a strategic partof the entire security system

For the EU’s new data protection regulation, encryption should be the default option - and should be seen as a strategic partof the entire security system
Published: 10th November 2015 | By:
This paper discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data.

Cover for Hadoop Appliances and Teradata

Hadoop Appliances and Teradata
Published: 19th October 2015 | By:
This paper discusses the use of Hadoop-based appliances and then specific features of the Teradata Appliance for Hadoop.

Cover for Automated testing: coping with change

Automated testing: coping with change
Published: 31st May 2015 | By:
Automated testing frameworks are not what they were even a couple of years ago.

Cover for Security industry market trends

Security industry market trends
Published: 13th April 2015 | By:
This paper discusses trends in the security threat landscape and looks at how organisations are being affected.

Cover for Application rationalisation, retirement and archiving: why and how?

Application rationalisation, retirement and archiving: why and how?
Published: 13th January 2015 | By:
In this paper we discuss how to approach application rationalisation and retirement, and related best practices.

Cover for Financial Services Directives - Requirements for Data Technologies

Financial Services Directives - Requirements for Data Technologies
Published: 13th January 2015 | By: and Bob McDowall
The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.

Cover for The need for active response to advanced threats - passive remediation is insufficient

The need for active response to advanced threats - passive remediation is insufficient
Published: 20th November 2014 | By:
Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.

Cover for Defending against the rogue - unwanted users, devices and applications

Defending against the rogue - unwanted users, devices and applications
Published: 28th October 2014 | By:
Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.

Cover for IBM: enhanced 360° view

IBM: enhanced 360° view
Published: 22nd September 2014 | By:
IBM is in the vanguard for what it calls an enhanced 360° view and it is clearly well positioned to capitalise on the future growth of this market.

Back To Top