Papers from Quocirca
This is a selection of papers on IT-Director.com. Would you like to view all papers we currently hold?
1. Weak Links
All organisations have to manage online information supply chain, this is a given. The security choices being made by those already pushing the information supply chain to its limits are a guide to those that will inevitably follow in their steps.
2. Getting to Know You
The need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, which means, when the case is well made, funds are available. Those transacting direct with consumers online are leading the way.
3. Room for improvement
This research report should be of interest to IT security professionals and others impacted by the risk of data losses; ultimately that is the directors and board members of any organisation.
4. Online domain maturity
The report presents new research into how European organisations are using and managing their online domains,the challenges they face and how these are being overcome.
5. Quocirca the insider threat: solved with DRM
This report looks at the extent of the challenges faced by organizations when it comes to the insider threat and the protection of sensitive information. It finishes by looking at some of the misconceptions about digital rights management.
6. Getting to grips with BYOD
This report investigates the impact that BYOD is having and what organisations are doing to cope. It is based on interviews with 700 IT decision makers across 11 European countries in mid-size and large enterprises.
7. WAN Speak Musings - Volume IV
A collection of blog articles from the Quocirca Analysts
8. Next-generation network access control
This report looks at the applied use of Next Generation-Network Access Ccontrol to support IT-Governance Risk Compliance controls, through the lens of three real world case studies in financial services, healthcare and creative media services.
9. Bringing System Management to Messaging & Collaboration
The fast growing interation between email, collaborative environments and social media usage on both fixed and mobile devices is putting pressure on the corporate management of these activities
10. Digital identities and the open business
This report presents research into the use and benefits of Identity and access management (IAM) and the relationship it has with these three drivers.
11. Dealing with Cloudy Data
There is a growing acceptance of cloud as a technology platform. However,few organisations are likely to end up with a single cloud strategy - they will end up with a hybrid mix of in-house private cloud and public clouds under the control of others.
12. Printing: a false sense of security?
This paper discusses how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Includes new research amongst 150 enterprises.
13. The identity perimeter
This paper should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services.
14. Availability, recovery and archive
Changes in how technology can be implremented and improvements in connectivity mean that business continuity and rapid systems recovery is now within the reach of many more organisations.
15. Effective print security for SMBs
the paper highlights the risks of unsecured printing and discusses how integrated print management provides SMBs with a simple and scalable approach for print security.