skip to Main Content
Cover for Getting ahead in the cloud - ...the need for better identity and access controls

Getting ahead in the cloud - ...the need for better identity and access controls
Published: 11th March 2013 | By:
This paper discusses recent developments in identity and access management technologies for cloud-based applications.

Cover for Harnessing big data for security - what are the key considerations and capabilities?

Harnessing big data for security - what are the key considerations and capabilities?
Published: 12th February 2013 | By:
This report discusses some of the challenges of harnessing big data security and outlines some of the key considerations and capabilities that organisations should consider.

Cover for Key considerations for security intelligence in big data - what a CISO needs to know

Key considerations for security intelligence in big data - what a CISO needs to know
Published: 12th February 2013 | By:
This document discusses the need for an intelligence-driven security approach and aims to provide pointers for security executives.

Cover for Database performance management - the importance of time-based analysis

Database performance management - the importance of time-based analysis
Published: 6th February 2013 | By:
This paper discusses the various issues that surround database performance monitoring and how we believe that they should be addressed

Cover for The value of big data in security - leveraging big data for intelligence-led security

The value of big data in security - leveraging big data for intelligence-led security
Published: 11th December 2012 | By:
This paper discusses the benefits that implementing a security intelligence platform can bring and discusses the essential components that organisations should look for when selecting a system.

Cover for Atego Asset Library

Atego Asset Library
Published: 16th November 2012 | By:
Storing system and software engineering artefacts for large-scale reuse.

Cover for Uniface Modernisation - moving enterprise integration into composite applications without pain

Uniface Modernisation - moving enterprise integration into composite applications without pain
Published: 14th November 2012 | By:
In the current climate, wasting existing resources is not an option and Uniface modernisation allows you to deliver modern web applications that don't compromise the exploitation of web and service orientation models.

Cover for Enhancing security through a trust-based approach - advanced threats require advanced weapons

Enhancing security through a trust-based approach - advanced threats require advanced weapons
Published: 7th November 2012 | By:
By creating a trusted environment in which only known good applications can run, control is handed back to the IT department.

Cover for Challenges and opportunities in the telecommunications sector

Challenges and opportunities in the telecommunications sector
Published: 6th September 2012 | By:
Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers.

Cover for Security based on trust not fear - ...the importance of a trusted cloud and Internet ecosystem

Security based on trust not fear - ...the importance of a trusted cloud and Internet ecosystem
Published: 30th August 2012 | By:
To build trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on.

Back To Top