IT-Analysis.com
IT-Analysis.com Logo
Business Issues Security & Risk
Business Issues Channels Enterprise Services SME Technology
Module Header
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - Managed Print Services: Are SMBs Ready?
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - The Managed Print Services (MPS) Opportunity for SMBs
Simon HollowayThe Holloway Angle
Simon Holloway
11th April - Intellinote - capture anything!
David NorfolkThe Norfolk Punt
David Norfolk
11th April - On the road to Morocco
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom

View More Events

Introduction

These papers have been filed against the Business Issues -> Security & Risk domain. Would you like to view all papers we currently hold?


Papers in Business Issues -> Security & Risk

Published By: Quocirca
Midmarket businesses face many of the same IT challenges as larger businesses, trying to accommodate increasing demand for new IT capabilities and services.
 
Published By: Quocirca
The expectations, working methods and tools used by employees in all organisations have changed as a result of advances in communications technologies.
 
Published By: Bloor Research
The use of complex software is now part of daily business life. Unfortunately cyber criminals are taking advantage of this to spread malware and to attack systems with the aim of stealing information, money and intellectual...
 
Published By: Bloor Research
Using its SANlogics software, SANpulse has solved two major enterprise problems in data and infrastructure management. First, it offers a complete solution delivering up-to-date visibility of the ever-changing, complex, multi-vendor...
 
Published By: Bloor Research
Local authorities provide a wide range of services from housing and education to business services and the environment. This means that they handle a substantial amount of sensitive information related to individuals, as well as material...
 
Published By: Bloor Research
Identity Management (IdM) solutions have been evolving since their establishment in the late 90's with the purpose of simplifying the management of user identities and access rights across an organisation's enterprise. Typically, IdM...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
This paper represents a snapshot and brief summary of the log and (security) event management market. A more detailed discussion of this market, together with overviews of each product, a discussion of the issues involved and product...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: