skip to Main Content

Each Technology page is effectively a mini site for a particular technology solution. Each page contains contextual information about the topic, commentary from our analysts, links to product information and additional educational resources if you wish to dig deeper.

  • All
  • Action
  • Data
  • Infrastructure
  • Trust

5g, IoT and Edge Computing

Revolutions are by their nature disruptive. They create winners and losers. Businesses need to be implementing IoT projects now and be developing their 5g networks and edge computing strategies to win in the 4th Industrial Revolution.

Advanced threat protection

Organisations are increasingly having to defend against attacks and threats that use ever-more-sophisticated tools and methods, which are highly targeted.


Analytics supports the complex multi-variant decision-making that is now taking place in the volatile global markets in which companies, and most governmental bodies, now operate.


A combination of tools, practices and cultural philosophies, that increases an organisation’s ability to design, implement and manage agile IT infrastructure.

Big Data

Big Data refers to the ability to analyse any type of data, not limited to (but including) data in relational tables. There may be a lot of such data …

Big Software

Big Software delivers real competitive advantage through significantly lower IT infrastructure costs and the ability to deploy more new business applications faster.


A blockchain is a distributed ledger, implemented across many servers, consisting of a continuously growing list of records, called blocks, which are linked across the whole network and secured using cryptography.

Data Centres

Data Centres are the dedicated spaces used to locate and run servers, storage and networking equipment.

Data Discovery and Catalogues

Both data discovery and data cataloguing are designed to allow you to know what you have and how it is related.

Data Governance

Data governance is about ensuring that your organisation’s information assets meet corporate policies for accuracy, timeliness, completeness and compliance.

Data Masking

Developers and data scientists may not be allowed to see detailed personal information but at the same time they may need that data, or its equivalent.

Data Movement

Data movement does what its name suggests and there are multiple ways of doing so and of avoiding do so.

Data Warehousing

A data warehouse is a database implementation that supports the storage and analysis of historic data, with the aim of understanding what happened in the past or predicting what will happen in the future.


DevOps is about encouraging a culture of collaboration across development, operations and business silos (and, by implication, removing these silos).


Encryption – and its opposite, decryption – is the process of converting data into code that is unreadable by a human who does not possess the necessary key for decrypting it.

Endpoint Detection and Response

EDR technologies vastly improve visibility into not only which endpoints are on the network, but also their security posture, allowing for advanced threat detection and response to counter even the most sophisticated threats.

Graph Databases

Graph databases store data in terms of entities and the relationships between entities.

Hybrid Infrastructure Management

Hybrid Infrastructure Management is the monitoring and analysing of your IT infrastructure in a manner that relates to their impact on the performance and availability of your business applications.

Identity and Trust

Identity and access management tools are key weapons in any organisation’s arsenal for protecting the confidentiality, integrity and availability of sensitive information.

Information Governance and Data Security

Adequate and appropriate security controls must be applied to all information and data for effective information governance purposes and accountability.


Our infrastructure practice aims to articulate the infrastructure story to make it meaningful for the CIO

Low-Code/No-Code Development

Low and no-code development allow you to develop applications unprecedentedly quickly and efficiently while enabling citizen development, collaboration and self-service.

Machine Learning and Artificial Intelligence

At its simplest it is using computers to run algorithms that give them the ability to undertake reasoning that was previously seen as the preserve of humans.


Many enterprises still run on Mainframes but start-ups that value growth without early over-provisioning should also consider Mainframe platforms.

Managed Detection and Response

Managed detection and response (MDR) refers to a threat monitoring, detection, incident analysis and response services.


Large organisations have many systems which store data, and the man­agement of multiple and competing definitions of this data is known as Master Data Management (MDM)

Network and Endpoint Security

Network security refers to those technologies and processes that are used to keep networks in good, secure working order. Network security encompasses the prime

NoSQL Databases

NoSQL – not only SQL – non-relational databases.

Operational Databases

An operational database is designed to run the day-to-day operations or transactions of your business.

Security analytics

Analysing the vast swathes of security information that the average organisation generates has enormous potential for reducing the risks that they face.

Security Response Orchestration

Security response orchestration arms organisations with the tools that they need to automate responses where possible, supplementing this with human knowledge and experience where required.

Service Virtualisation

Service virtualisation is a technique used to virtualise external services used by a developing system, so that it can be developed and tested without regard to the stability or availability of services it depends on.

Spreadsheet Governance

Spreadsheet governance is a specialised aspect of governance – dealing with the error-prone nature of spreadsheets and their ungoverned proliferation.

Streaming Analytics Platforms

Once there was complex event processing but now the major market for event processing is in streaming analytics.

Test Data Management

This is the use of tools to make a representative subset or copy of a whole database that lets you adequately test relevant applications.

Test Design Automation

Test design automation provides a potentially massive boost to testing speed and efficiency. Properly leveraged, it can also dramatically improve the end-user experience.


Trust can be defined as the ability to believe in the reliability and integrity of something or someone.

Trust in Data

There are various data tools that enable us to trust, specifically data profiling, data quality and data preparation.

User and Entity Behavior Analytics

Context is king when defending against sophisticated, advanced threats. UEBA technologies provide that context and are a key addition to any security analytics and intelligence capability.

Back To Top