IT-Analysis.com
IT-Analysis.com Logo
Business Issues Security & Risk
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
22nd April - Internet of Things: A New Era for Smart Printing?
Simon HollowayThe Holloway Angle
Simon Holloway
18th April - Virgin Media expose private email addresses
Craig WentworthMWD Advisors
Craig Wentworth
17th April - Box's enterprise customers step forward to be counted
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom
Ten Steps to Data Quality
8th May - 9th May
London, United Kingdom

View More Events

Introduction

This is a selection of papers on IT-Analysis.com. Would you like to view all papers we currently hold?


Papers from Bloor Research

Published By: Bloor Research
Identity and access management technologies and services are used to increase security by ensuring that applications and the data they contain are not accessed inappropriately. These services also aid productivity by ensuring that those with the...
 
Published By: Bloor Research
Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on in a piecemeal fashion....
 
Published By: Bloor Research
Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers. They must transform from providers of commodity voice services to seek opportunities presented by emerging technologies,...
 
Published By: Bloor Research
Rather than being an inhibitor to take up of cloud computing, the use of cloud services can actually improve an organisation's security stance. Cloud delivery is suitable for a range of security services from basic ones such as malware protection...
 
Published By: Bloor Research
With Innovator for Business Analysts, MID offers a modern, forwards looking tool for the business analyst role-oriented towards business stakeholders (rather than mainly targeting IT). It helps the business analysts in a business to manage...
 
Published By: Bloor Research
This document is aimed at those looking at data centre builds, upgrades or consolidation. It provides an introduction to some of the new security challenges of such environments and provides recommendations for implementing security in...
 
Published By: Bloor Research
The security threats that we face are getting ever more harmful. Attacks launched en masse are no longer the order of the day. Rather, they are targeted, use a complex range of techniques, are sophisticated in their ability to defeat reactive...
 
Published By: Bloor Research
This survey looked at the business arguments for using an enterprise social networking (ESN) system based on software as a service (SaaS). We also investigated decision makers' views on the comparative qualities of SaaS based systems and those…
 
Published By: Bloor Research
The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software innovation and social networking has fuelled the progress in handset...
 
Published By: Bloor Research
The title if this paper may be somewhat misleading: it is about data exchange and the ability to share information but, specifically, it is about those exchanges and that sharing taking place outside the confines of your...
 
Published By: Bloor Research
In December 2010 the media was alive with stories of hacktivists attacking payment websites including Visa, MasterCard and PayPal in response to those organisation's refusal to take payments in support of the WikiLeaks website. Every day we...
 
Published By: Bloor Research
The growth of compliance requirements over the past few years has sometimes been seen as a US-based phenomenon as regulations are implemented to address various corporate failures and scandals over the past decade or so. In fact, compliance,...
 
Published By: Bloor Research
In 2009, it is estimated that 90 trillion emails were sent, translating to 247 billion messages per day. Yet it is not just emails that are contributing to the growth in electronic communications as the use of media such as instant messages, blogs..
 
Published By: Bloor Research
The use of complex software is now part of daily business life. Unfortunately cyber criminals are taking advantage of this to spread malware and to attack systems with the aim of stealing information, money and intellectual...
 
Published By: Bloor Research
Using its SANlogics software, SANpulse has solved two major enterprise problems in data and infrastructure management. First, it offers a complete solution delivering up-to-date visibility of the ever-changing, complex, multi-vendor...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: