Bloor Research

Displaying 1-17 of 17 results

  • White Papers // Jun 2013

    Blended security threats need a unified response

    Security threats are becoming increasingly complex, sophisticated and targete and no organisation is immune, no matter how small it may be or how large a security staff it can maintain. At the same time, the world is becoming increasingly interactive and collaborative, with real time communication among employees, customers and...

    Provided By Bloor Research

  • White Papers // Jan 2013

    Enhancing security through a trust-based approach

    Cyberthreats are becoming ever more insidious and affect organisations of all sizes, spanning all industries. In many cases, the organisation will not know that it has been a victim of an attack as today's threats aim to evade traditional, reactive security controls and gain a foothold in the organisation's network...

    Provided By Bloor Research

  • White Papers // Jun 2011

    What to consider when choosing a SaaS or cloud provider

    The use of Software as a Service (SaaS) offers many benefits for or?ganisations of any size, but is especially beneficial to smaller organisa?tions that lack the budget and resources to manage in-house technology deployments, or for larger, highly distributed organisations with large numbers of mobile workers. Because of the benefits...

    Provided By Bloor Research

  • White Papers // Nov 2010

    Investing in Security Versus Facing the Consequences

    The internet and associated electronic communications mechanisms have revolutionized the way that the handle information, connect with each other and interact with organizations. Today, organizations routinely offer services via the internet to their customers, such as online banking and ecommerce. However, the information exchanged via such services is often highly...

    Provided By Bloor Research

  • White Papers // Jun 2010

    The benefits of email archiving

    Email archiving lowers the risk of being unable to find important documents and help in achieving regulatory compliance and answering litigation requests.

    Provided By Bloor Research

  • White Papers // Jun 2010

    Email archiving in the cloud

    An email archiving service based in the cloud must provide a complete service, including guaranteed availability, coverage of all email systems, a tamper-proof database, and provision of reports and an audit trail.

    Provided By Bloor Research

  • White Papers // Jun 2010

    The need for email archiving

    Without an effective system for archiving emails, organisations can find themselves unable to recover vital business records, leaving them open to charges of non-compliance with regulations or unable to answer litigation requests.

    Provided By Bloor Research

  • White Papers // Jun 2010

    When the Cloud Improves Security

    Malware threats are on the rise and the attacks are growing in sophistication and complexity. Individuals and specific organisations are increasingly being targeted, using exploits that rely on more than one attack vector, often combining a phishing email with web-borne malware. Many attacks today play to human nature, using social...

    Provided By Bloor Research

  • White Papers // Jun 2010

    The Benefits Of A Cloud-Based Email Archiving Service

    The need to protect sensitive corporate information contained in emails and their attachments is cited by organizations as among the prime motivations for investing in email archiving technologies. This is in order to improve productivity by being able to quickly retrieve information as and when it is needed and to...

    Provided By Bloor Research

  • White Papers // Feb 2010

    What the ideal cloud-based web security service should provide

    The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats. This document provides an outline of the main components of a cloud-based web security solution that will give organisations the assurance that they need that...

    Provided By Bloor Research

  • White Papers // Feb 2010

    The benefits of a cloud-based service for web security

    The use of a web security service based in the cloud can be of great value to any organisation, from the smallest to the very large, and can also allow it to shave costs off the investment and to reduce the risks that a security attack will be successful.

    Provided By Bloor Research

  • White Papers // Feb 2010

    The realities of web security

    The web has become a prime vector of attack favoured by financially motivated hackers looking to get their hands on sensitive or confidential information flowing across the internet. To better defend against attacks, it makes sense to move security protections to where the threats are coming from-in the cloud.

    Provided By Bloor Research

  • White Papers // Feb 2010

    Why Web Security Is Best Served in the Cloud: Move Protection to Where the Threats Are

    No business is an island. For every organisation, the ability to communicate effectively with employees, customers and business partners, and to provide its employees with access to information as and when they need it requires that it maintain an online presence and enable its employees to access information on the...

    Provided By Bloor Research

  • Case Studies // Apr 2009

    Bloor Research Case Study: SenSage at O2 Ireland

    O2 is a part of Telef?nica, which was originally established as Companiia Telef?nica Nacional de Espana in 1924 as the Spanish subsidiary of AT&T. It needed to meet the requirements of the EU Data Retention Directive, to meet the demands of other compliance requirements such as Sarbanes-Oxley (SOX) and the...

    Provided By Bloor Research

  • White Papers // Mar 2009

    EU Compliance and Regulations for the IT Security Professional

    The protection of data as it rests, transacts or journeys through computer systems is seen as a major component of good corporate hygiene. As well as protecting organisations from reputational risk and damaging losses, failure to protect this data can now result in both corporate and personal criminal prosecutions. The...

    Provided By Bloor Research

  • White Papers // Nov 2008

    Managing Security Risk and Compliance: CA Mainframe Security

    Security is here to stay - no one in this day and age ever asks for less security and so it is with mainframe systems that are increasingly back in vogue. Securing the systems responsible for holding all of an organisation's core data is an onerous task and one that...

    Provided By Bloor Research

  • White Papers // Nov 2008

    Database Performance Management

    Companies are moving towards the real-time enterprise. They are also focused on business process optimisation. Unfortunately, these initiatives will be undermined if data is not provided as and when it is needed. However, that is not as simple as having the data in database: it requires the data to be...

    Provided By Bloor Research

  • White Papers // Nov 2008

    Managing Security Risk and Compliance: CA Mainframe Security

    Security is here to stay - no one in this day and age ever asks for less security and so it is with mainframe systems that are increasingly back in vogue. Securing the systems responsible for holding all of an organisation's core data is an onerous task and one that...

    Provided By Bloor Research

  • White Papers // Nov 2008

    Database Performance Management

    Companies are moving towards the real-time enterprise. They are also focused on business process optimisation. Unfortunately, these initiatives will be undermined if data is not provided as and when it is needed. However, that is not as simple as having the data in database: it requires the data to be...

    Provided By Bloor Research

  • White Papers // Mar 2009

    EU Compliance and Regulations for the IT Security Professional

    The protection of data as it rests, transacts or journeys through computer systems is seen as a major component of good corporate hygiene. As well as protecting organisations from reputational risk and damaging losses, failure to protect this data can now result in both corporate and personal criminal prosecutions. The...

    Provided By Bloor Research

  • White Papers // Feb 2010

    Why Web Security Is Best Served in the Cloud: Move Protection to Where the Threats Are

    No business is an island. For every organisation, the ability to communicate effectively with employees, customers and business partners, and to provide its employees with access to information as and when they need it requires that it maintain an online presence and enable its employees to access information on the...

    Provided By Bloor Research

  • White Papers // Jun 2010

    When the Cloud Improves Security

    Malware threats are on the rise and the attacks are growing in sophistication and complexity. Individuals and specific organisations are increasingly being targeted, using exploits that rely on more than one attack vector, often combining a phishing email with web-borne malware. Many attacks today play to human nature, using social...

    Provided By Bloor Research

  • White Papers // Nov 2010

    Investing in Security Versus Facing the Consequences

    The internet and associated electronic communications mechanisms have revolutionized the way that the handle information, connect with each other and interact with organizations. Today, organizations routinely offer services via the internet to their customers, such as online banking and ecommerce. However, the information exchanged via such services is often highly...

    Provided By Bloor Research

  • White Papers // Jun 2010

    The Benefits Of A Cloud-Based Email Archiving Service

    The need to protect sensitive corporate information contained in emails and their attachments is cited by organizations as among the prime motivations for investing in email archiving technologies. This is in order to improve productivity by being able to quickly retrieve information as and when it is needed and to...

    Provided By Bloor Research

  • White Papers // Jan 2013

    Enhancing security through a trust-based approach

    Cyberthreats are becoming ever more insidious and affect organisations of all sizes, spanning all industries. In many cases, the organisation will not know that it has been a victim of an attack as today's threats aim to evade traditional, reactive security controls and gain a foothold in the organisation's network...

    Provided By Bloor Research

  • White Papers // Jun 2013

    Blended security threats need a unified response

    Security threats are becoming increasingly complex, sophisticated and targete and no organisation is immune, no matter how small it may be or how large a security staff it can maintain. At the same time, the world is becoming increasingly interactive and collaborative, with real time communication among employees, customers and...

    Provided By Bloor Research

  • White Papers // Feb 2010

    The realities of web security

    The web has become a prime vector of attack favoured by financially motivated hackers looking to get their hands on sensitive or confidential information flowing across the internet. To better defend against attacks, it makes sense to move security protections to where the threats are coming from-in the cloud.

    Provided By Bloor Research

  • White Papers // Feb 2010

    What the ideal cloud-based web security service should provide

    The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats. This document provides an outline of the main components of a cloud-based web security solution that will give organisations the assurance that they need that...

    Provided By Bloor Research

  • White Papers // Feb 2010

    The benefits of a cloud-based service for web security

    The use of a web security service based in the cloud can be of great value to any organisation, from the smallest to the very large, and can also allow it to shave costs off the investment and to reduce the risks that a security attack will be successful.

    Provided By Bloor Research

  • Case Studies // Apr 2009

    Bloor Research Case Study: SenSage at O2 Ireland

    O2 is a part of Telef?nica, which was originally established as Companiia Telef?nica Nacional de Espana in 1924 as the Spanish subsidiary of AT&T. It needed to meet the requirements of the EU Data Retention Directive, to meet the demands of other compliance requirements such as Sarbanes-Oxley (SOX) and the...

    Provided By Bloor Research

  • White Papers // Jun 2010

    The benefits of email archiving

    Email archiving lowers the risk of being unable to find important documents and help in achieving regulatory compliance and answering litigation requests.

    Provided By Bloor Research

  • White Papers // Jun 2010

    Email archiving in the cloud

    An email archiving service based in the cloud must provide a complete service, including guaranteed availability, coverage of all email systems, a tamper-proof database, and provision of reports and an audit trail.

    Provided By Bloor Research

  • White Papers // Jun 2010

    The need for email archiving

    Without an effective system for archiving emails, organisations can find themselves unable to recover vital business records, leaving them open to charges of non-compliance with regulations or unable to answer litigation requests.

    Provided By Bloor Research

  • White Papers // Jun 2011

    What to consider when choosing a SaaS or cloud provider

    The use of Software as a Service (SaaS) offers many benefits for or?ganisations of any size, but is especially beneficial to smaller organisa?tions that lack the budget and resources to manage in-house technology deployments, or for larger, highly distributed organisations with large numbers of mobile workers. Because of the benefits...

    Provided By Bloor Research