Category Archives: IT Security, Risk & ESG

Do more of your apps deserve better DR?

What does IT disaster recovery (DR) mean to you? Does it bring to mind racks[...]

The Democratization of IT Disaster Recovery

If it has been a while since you thought about your DR measures, or a[...]

Have you planned for a ’friendly’ DDoS attack?

Malicious Distributed Denial of Service (DDoS) attacks do not occur often. Nevertheless, for an enterprise[...]

Mobile security is more than protecting local data

By now we’ve all heard the term Bring Your Own Device (BYOD). This phenomenon is[...]

What are APT’s?

What is an APT? APT stands for Advanced Persistent Threat. The goal of this form[...]

Say What?

Recently I attended the IBM Security Systems Analyst Meet the Experts day in Heathrow. With[...]

Security: the oft-forgotten dimension

Computer security is a hot topic today, and much talked about. There are endless emanations[...]

Computer Security: Knowing What You Don’t Know

100 per cent security is a fantasy: you will be attacked by both known and[...]

The State of Network Infrastructure

By Tony Lock Networks are the glue that allow users to function effectively in their[...]

The Death of the Corporate Network Perimeter

By Tony Lock In a recent survey over 400 respondents gave us the inside track[...]

Juggling Performance, Availability and Security

By Tony Lock A recent report from Freeform Dynamics illustrates that many corporate networks are[...]

Controlling Application Access

Application performance, availability and security challenges are quietly creeping up in the context of internal[...]

The Security Education Dilemma

By Charles Brett Security covers many dimensions, including the physical and logical. As such many[...]

Are we barking up the wrong mobile data protection tree?

By Charles Brett Professional IT prefers disciplined approaches which back up, or copy, all enterprise[...]

Software Defined Networking (SDN) continues to move forwards

By Charles Brett and Tony Lock During an Analyst Briefing at the IBM Development Laboratory[...]

The Business Value of Data Protection

By Tony Lock The data held in every business is valuable and in the current[...]

Device Proliferation and Data Fragmentation

By Tony Lock Bring your own device (BYOD) continues to attract considerable attention, but the[...]

Data fragmentation challenges for CIOs

By Tony Lock A recent survey by Freeform Dynamics confirmed that access to accurate information[...]

The End User Security Jigsaw

Organisations of all sizes are trying to understand the security implications of mobile working, device[...]

The Data Protection Imperative

In this short paper, we spell out why the time has come to adopt a[...]

Data Protection as a Business Enabler

While the importance of business information is almost universally recognised, few organisations have enjoyed either[...]

Storage Anywhere and Everywhere

With more departmental applications, collaboration and sharing environments, and even cloud-based services, with access via[...]

Managing expanding business – Critical Linux workloads

Evidence from users in the real world shows that for large workloads, the mainframe offers[...]

DCIM and Energy Management

By Tony Lock Over several decades IT management has focussed almost exclusively on keeping servers[...]

© Freeform Dynamics Limited - 2006 - 2024. All rights reserved. Unauthorised use of copy is not permitted.