Skip to main content
Main Menu
  • Security on the move

    With data breaches a seemingly everyday occurrence, more could be done to protect data from loss. This article discusses the role that encryption plays in protecting data stored on mobile and portable devices.

    Read more
  • Should encryption be optional?

    The use of encryption can be considered best practice for protecting data on the move from loss or theft, but now it is no longer optional for many.

    Read more
  • The informed traveller

    A recent event co-hosted by the Mobile Data Association and the Location and Timing Knowledge Transfer Network, looked at new and emerging location based technologies and applications that have the potential to change the way people and professionals plan their journeys and travel.

    Read more
  • The state of play at CA

    Software vendor CA recently played host to the Industry Analyst community with a mid year update. Some bright indicators are to found in the company's position, while a few product challenges remain to be addressed.

    Read more
  • How to secure your on-the-go data

    The use of encryption is key, but identity management and DLP have their parts to play.

    Read more
  • Social networking and systems management - an unlikley combination?

    Can social networking actually be useful? There are plenty of claims made about Twitter's usefulness for getting concise messages to a broad audience or using LinkedIn to track down old colleagues who may be able make an introduction to a new prospect. But what about direct benefits - such as finding quick solutions to problems or getting better deals on products?

    Read more
  • Policy everywhere, with little to link it

    As Quocirca discusses in its freely available report "Content Security for the Next Decade" policies that define the way data must be handled are fundamental to good e-security practice, but where do you store the associated e-security policies? A written set of policies for handling data should be the starting point and such a document should be readily available to all employees and, where relevant, external data users for a given organisation. But policy can be enforced through a range of security tools in various parts of the IT infrastructure and this can lead to policy needing to be defined in several places.

    Read more
  • Multi-videoconferencing for the many

    Travel budgets are being squeezed - gone are the days of leaping on the nearest plane and flying first class to have a 2 hour meeting on the other side of the pond, However, top-end videoconferencing suites, although highly effective, are not widespread in use as yet, generally due to the high costs of tele-immersion systems, and the need for dedicated rooms and managed high-bandwidth connections.

    Read more
  • When is an appliance not an appliance?

    A few years ago Quocirca reviewed the deployment of Microsoft ISA server by The Kensington and Chelsea NHS Trust in all its remote surgeries and clinics. Microsoft was keen to promote the fact that ISA Server (ISA stands for Internet Security and Acceleration) had won over specialist appliance based offerings for network acceleration.

    Read more

Pages