Risk - White papers

2014-08-28
Based on 640 interviews with IT decision-makers in large organisations –across eleven countries and a range of industry sectors— this survey explores attitudes and...
2014-08-24
Disasters can change the face of business in the blink of an eye. One need only to think back to the terrorists attacks of 9-11, Hurricane Katrina, or the Fukushima...
2014-07-15
The demands for heightened security through the use of multi-factor authentication are pressing, but so is the need to control budgets and give users convenient access...
2014-01-15
The tech landscape is constantly evolving. Cloud computing, virtualization and mobility have dramatically changed how organizations conduct business. At the same time,...
2014-01-06
Big Data Security Analytics (BDSA) is the subject of exuberant predictions. However, a Gartner analyst points outi that no available BDSA solutions come close to these...
2014-01-06
This report is based on a representative sample of 234 organizations in the following six countries: United States, United Kingdom, Australia, Germany, France and Japan...
2014-01-06
Is management of a virtualized environment a major concern? Does your business need a technology that helps you secure your virtual environments?    With the gaining...
2013-12-30
Most cloud security discussions have focused on what cloud providers can do, what they can’t do, and what they might do if you pay them enough. These discussions focus...
2013-12-30
Technology is the fabric of the global community. And information is the world’s most valuable commodity—now created, consumed, and delivered with always-on...
2013-12-06
This paper will provide detail on the attacks in use today, suggest realistic defensive architectures and tactics, and explain the basic process required to have a ...

Pages