Papers from Quocirca
This is a selection of papers on IT-Director.com. Would you like to view all papers we currently hold?
1. The trouble at your door
The research presented in this report examines the perceptions and experiences related to targeted cyber-attacks across 600 European organisations.
2. The myth of email as proof of communication
It is now time to look to a more ubiquitous means of achieving such a proof of content - and this can be done through the simple medium of email.
3. The many guises of the IoT
This report presents new research into the perceptions held with regard to the IoT along with looking at what those with less experience can learn and more.
4. From NO to KNOW
Attitudes to cloud-based services vary, but over time there has been increasing uptake as the benefits are recognised by more and more businesses.
5. Weak Links
All organisations have to manage online information supply chain, this is a given. The security choices being made by those already pushing the informationsupply chain to its limits are a guide to those that will inevitably follow in their steps.
6. Getting to Know You
The need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, which means, when the case is well made, funds are available. Those transacting direct with consumers online are leading the way.
7. Room for improvement
This research report should be of interest to IT security professionals and others impacted by the risk of data losses; ultimately that is the directors and board members of any organisation.
8. Online domain maturity
The report presents new research into how European organisations are using and managing their online domains,the challenges they face and how these are being overcome.
9. Quocirca the insider threat: solved with DRM
This report looks at the extent of the challenges faced by organizations when it comes to the insider threat and the protection of sensitive information. It finishes by looking at some of the misconceptions about digital rights management.
10. Getting to grips with BYOD
This report investigates the impact that BYOD is having and what organisations are doing to cope. It is based on interviews with 700 IT decision makers across 11 European countries in mid-size and large enterprises.
11. WAN Speak Musings - Volume IV
A collection of blog articles from the Quocirca Analysts
12. Next-generation network access control
This report looks at the applied use of Next Generation-Network Access Ccontrol to support IT-Governance Risk Compliance controls, through the lens of three real world case studies in financial services, healthcare and creative media services.
13. Bringing System Management to Messaging & Collaboration
The fast growing interation between email, collaborative environments and social media usage on both fixed and mobile devices is putting pressure on the corporate management of these activities
14. Digital identities and the open business
This report presents research into the use and benefits of Identity and access management (IAM) and the relationship it has with these three drivers.
15. Dealing with Cloudy Data
There is a growing acceptance of cloud as a technology platform. However,few organisations are likely to end up with a single cloud strategy - they will end up with a hybrid mix of in-house private cloud and public clouds under the control of others.