Getting ahead in the cloud - ...the need for better identity and access controls
Published: 11th March 2013 | By: Fran Howarth
This paper discusses recent developments in identity and access management technologies for cloud-based applications.
Harnessing big data for security - what are the key considerations and capabilities?
Published: 12th February 2013 | By: Fran Howarth
This report discusses some of the challenges of harnessing big data security and outlines some of the key considerations and capabilities that organisations should consider.
Key considerations for security intelligence in big data - what a CISO needs to know
Published: 12th February 2013 | By: Fran Howarth
This document discusses the need for an intelligence-driven security approach and aims to provide pointers for security executives.
Database performance management - the importance of time-based analysis
Published: 6th February 2013 | By: Philip Howard
This paper discusses the various issues that surround database performance monitoring and how we believe that they should be addressed
The value of big data in security - leveraging big data for intelligence-led security
Published: 11th December 2012 | By: Fran Howarth
This paper discusses the benefits that implementing a security intelligence platform can bring and discusses the essential components that organisations should look for when selecting a system.
Atego Asset Library
Published: 16th November 2012 | By: David Norfolk
Storing system and software engineering artefacts for large-scale reuse.
Uniface Modernisation - moving enterprise integration into composite applications without pain
Published: 14th November 2012 | By: David Norfolk
In the current climate, wasting existing resources is not an option and Uniface modernisation allows you to deliver modern web applications that don't compromise the exploitation of web and service orientation models.
Enhancing security through a trust-based approach - advanced threats require advanced weapons
Published: 7th November 2012 | By: Fran Howarth
By creating a trusted environment in which only known good applications can run, control is handed back to the IT department.
Challenges and opportunities in the telecommunications sector
Published: 6th September 2012 | By: Fran Howarth
Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers.
Security based on trust not fear - ...the importance of a trusted cloud and Internet ecosystem
Published: 30th August 2012 | By: Fran Howarth
To build trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on.