Skip to main content
Main Menu
  • End point security - the right protection in the right place

    In IT the term end point is broad, covering everything from servers at a fixed location inside the firewall to smartphones that may move from one side of the globe to another in a matter of hours. End points can also be virtual and/or hosted by third parties makes things more complex still. There is no single answer to how end points should be secured, it depends on the type of device, the person (or people) using it and the nature of the transactions it is expected to be used for. This presentation will look at the different options for securing end points, from mobile malware protection to next generation firewalls, and discuss what is appropriate when and where.

    View this presentation
  • Cloud computing: Platform shift or game changer?

    Is the increasing focus on cloud something that requires a complete technology rethink, or is it a logical evolution of where IT was already going?

    View this presentation
  • Sensible Business IT

    A single change in a data centre can have ripple impacts that are unforeseen. The need for effective predictive analysis and modelling of "what-ifs?" are now of increasing importance.

    View this presentation
  • The death of the enterprise application

    In many cases, the enterprise application has become a major constraint on a business. As web services, service oriented architectures and cloud comoputing come more to the fore, there will be a move towards a far more open, functional construct - the composite application aimed at facilitating tasks and processes.

    View this presentation
  • The evolving threat landscape

    Cyber threats have moved on from the lonely geek wanting to show that they could do something to highly sophisticated groups of organised crime teams aiming firmly at making money through cyber threats and actions. What can be done to ammeliorate the risks?

    View this presentation
  • Protecting other people's money

    An overview of PCI-DSS and how channel organisations can help their customers meet its requirements.

    View this presentation
  • To lose one set of data...

    Data is far more important than the devices it resides upon, and building a compliance oriented architecture (COA) that secures the data is increasingly important. This presentation looks at the issues and presents a framework for a COA

    View this presentation
  • IT security in the real world - A value proposition

    IT security is often seen as purely an expense that mitigates certain risks. It is more than this, IT security provides the confidence for businesses to share data safely across multiple communications channels. This is an essential requirement for all 21st century businesses.

    View this presentation
  • The Future of GreenGreen may have drop

    Green may have dropped down the priotity list for 2010 as recessionary budgets become the norm. However, a lot of green activity is directly beneficial to the bottom line and can be carried out with immediate or very rapid pay back.

    View this presentation
  • Change Management - Minimising business interruptions

    Manual approaches to managing technical change within an organisation often lead to chaotic situations, with different upgrade and patch levels being applied at servers and desktops. Also, the lack of change management at the human level leads to massive issues at the end-user and help desk levels. Just what needs to be done?

    View this presentation

Pages