skip to Main Content

This page was archived on 11th March, 2019 and is no longer actively maintained.

Cloud security - Further Information

This page shows up to 100 pieces of content (newest at the top):

Cover for The new reality for government

The new reality for government

The UK government has little option but to rethink the way it operates by moving beyond digital transformation to digital reinvention.
Cover for Overcoming the complexity gap

Overcoming the complexity gap - the role of automation in optimising network performance and security

This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...
Cover for The state of play for identity management services

The state of play for identity management services - evidence from organisations in Germany and the UK

The results of this survey show that interest in the use of SaaS applications among organisations in Germany and the UK is increasing.
Cover for Blended security threats need a unified response

Blended security threats need a unified response - the need for an integrated, cloud-based threat vector management platform

Security threats are becoming increasingly complex, sophisticated and targeted and no organisation is immune.
Cover for Getting ahead in the cloud

Getting ahead in the cloud - ...the need for better identity and access controls

This paper discusses recent developments in identity and access management technologies for cloud-based applications.
post (Icon)

Trust as the foundation of security

Trust is essential for building a sustainable business. Security is essential for building trust. To build trust in electronic networks, security...
Cover for Security based on trust not fear

Security based on trust not fear - ...the importance of a trusted cloud and Internet ecosystem

To build trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on.
Cover for Cloud-delivered endpoint security

Cloud-delivered endpoint security - better protection is delivered via the cloud

Cloud-based endpoint security services are suited for use by any organisation that allows its users to interact and communicate using internet channels.
Cover for Best practices for cloud security

Best practices for cloud security - how security in the cloud can be a better bet than doing it yourself

Although due diligence is required in the selection of such services, organisations should no longer consider security to be an inhibitor
Cover for Why web security is best served in the cloud

Why web security is best served in the cloud - Move protection to where the threats are

With the web becoming the prime method of attack as other vectors are closed through security solutions, organisations are increasingly looking to beef up their security controls for web threats. But for many resource-strapped organisations looking to do more with…
Back To Top