IT-Analysis.com
IT-Analysis.com Logo
Technology Security
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
22nd April - Internet of Things: A New Era for Smart Printing?
Simon HollowayThe Holloway Angle
Simon Holloway
18th April - Virgin Media expose private email addresses
Craig WentworthMWD Advisors
Craig Wentworth
17th April - Box's enterprise customers step forward to be counted
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom

View More Events

Introduction

These papers have been filed against the Technology -> Security domain. Would you like to view all papers we currently hold?


Papers in Technology -> Security

Published By: Quocirca
Quocirca continued to write artifcles for SearchDataCenter throughout 2013
 
Published By: Quocirca
A collection of blog articles from the Quocirca Analysts
 
Published By: Quocirca
This report looks at the applied use of Next Generation-Network Access Ccontrol to support IT-Governance Risk Compliance controls, through the lens of three real world case studies in financial services, healthcare and creative media services.
 
Published By: Quocirca
The fast growing interation between email, collaborative environments and social media usage on both fixed and mobile devices is putting pressure on the corporate management of these activities
 
Published By: Quocirca
This report presents research into the use and benefits of Identity and access management (IAM) and the relationship it has with these three drivers.
 
Published By: Quocirca
There is a growing acceptance of cloud as a technology platform. However,few organisations are likely to end up with a single cloud strategy - they will end up with a hybrid mix of in-house private cloud and public clouds under the control of others.
 
Published By: Bloor Research
Identity and access management technologies and services are used to increase security by ensuring that applications and the data they contain are not accessed inappropriately. These services also aid productivity by ensuring that those with the...
 
Published By: Quocirca
This paper discusses how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Includes new research amongst 150 enterprises.
 
Published By: Quocirca
This paper should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services.
 
Published By: Quocirca
New research, presented in this report, underlines the scale and real impact of the problem, the measures being taken to defend against targeted attacks and how effective they are.
 
Published By: Bloor Research
Volumes of data are expanding rapidly, and effectively harnessing the data volumes generated by organisations today brings both significant gains as well as challenges. In particular, big data security sets bring specialised challenges owing to…
 
Published By: Bloor Research
Today, all organisations face threats from targeted, sophisticated attacks by well resourced and motivated criminals who are looking to conduct industrial espionage for the purpose of stealing trade secrets or intellectual property, to disrupt...
 
Published By: Quocirca
Changes in how technology can be implremented and improvements in connectivity mean that business continuity and rapid systems recovery is now within the reach of many more organisations.
 
Published By: Quocirca
the paper highlights the risks of unsecured printing and discusses how integrated print management provides SMBs with a simple and scalable approach for print security.
 
Published By: Bloor Research
Cyberthreats are becoming ever more insidious and affect organisations of all sizes, spanning all industries. In many cases, the organisation will not know that it has been a victim of an attack as today's threats aim to evade...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: