IT-Analysis.com
IT-Analysis.com Logo
Technology Security
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
22nd April - Internet of Things: A New Era for Smart Printing?
Simon HollowayThe Holloway Angle
Simon Holloway
18th April - Virgin Media expose private email addresses
Craig WentworthMWD Advisors
Craig Wentworth
17th April - Box's enterprise customers step forward to be counted
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom

View More Events

Introduction

This is a selection of papers on IT-Analysis.com. Would you like to view all papers we currently hold?


Papers from Bloor Research

Published By: Bloor Research
Identity and access management technologies and services are used to increase security by ensuring that applications and the data they contain are not accessed inappropriately. These services also aid productivity by ensuring that those with the...
 
Published By: Bloor Research
Volumes of data are expanding rapidly, and effectively harnessing the data volumes generated by organisations today brings both significant gains as well as challenges. In particular, big data security sets bring specialised challenges owing to…
 
Published By: Bloor Research
Today, all organisations face threats from targeted, sophisticated attacks by well resourced and motivated criminals who are looking to conduct industrial espionage for the purpose of stealing trade secrets or intellectual property, to disrupt...
 
Published By: Bloor Research
Cyberthreats are becoming ever more insidious and affect organisations of all sizes, spanning all industries. In many cases, the organisation will not know that it has been a victim of an attack as today's threats aim to evade...
 
Published By: Bloor Research
Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on in a piecemeal fashion....
 
Published By: Bloor Research
Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers. They must transform from providers of commodity voice services to seek opportunities presented by emerging technologies,...
 
Published By: Bloor Research
Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats, which is especially important given the sophisticated nat…
 
Published By: Bloor Research
Rather than being an inhibitor to take up of cloud computing, the use of cloud services can actually improve an organisation's security stance. Cloud delivery is suitable for a range of security services from basic ones such as malware protection...
 
Published By: Bloor Research
With Innovator for Business Analysts, MID offers a modern, forwards looking tool for the business analyst role-oriented towards business stakeholders (rather than mainly targeting IT). It helps the business analysts in a business to manage...
 
Published By: Bloor Research
This document is aimed at those looking at data centre builds, upgrades or consolidation. It provides an introduction to some of the new security challenges of such environments and provides recommendations for implementing security in...
 
Published By: Bloor Research
The security threats that we face are getting ever more harmful. Attacks launched en masse are no longer the order of the day. Rather, they are targeted, use a complex range of techniques, are sophisticated in their ability to defeat reactive...
 
Published By: Bloor Research
This survey looked at the business arguments for using an enterprise social networking (ESN) system based on software as a service (SaaS). We also investigated decision makers' views on the comparative qualities of SaaS based systems and those…
 
Published By: Bloor Research
The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software innovation and social networking has fuelled the progress in handset...
 
Published By: Bloor Research
The title if this paper may be somewhat misleading: it is about data exchange and the ability to share information but, specifically, it is about those exchanges and that sharing taking place outside the confines of your...
 
Published By: Bloor Research
In December 2010 the media was alive with stories of hacktivists attacking payment websites including Visa, MasterCard and PayPal in response to those organisation's refusal to take payments in support of the WikiLeaks website. Every day we...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: