White Papers

Removing the Complexity from Information Protection

How encryption can add value to your business With data breaches widespread, no organisa ...

Removing the Complexity from Information Protection

Risk and Resilience

The modern business is highly dependent on IT. When systems go down, the disruption can be widely felt, and even lead to tangible damage ...

Risk and Resilience

The Impact of IT Security Attitudes

Putting the pieces in place for effective security delivery    Much has been writte ...

The Impact of IT Security Attitudes

Managing Information Risk

With organisations being so dependent on the electronic capture, storage and retrieval of increasing amounts of information, how we ...

Managing Information Risk

An Introduction to becoming PCI Compliant

This white paper discusses the background of the Payment Card Industry Data Security Standard (PCI DSS)

An Introduction to becoming PCI Compliant

A Value Proposition for IT Security

IT departments are facing three big issues when it comes to protecting the data created and stored on the systems ...

A Value Proposition for IT Security

Protective Monitoring - An Introduction to GPG 13

What is protective monitoring, anyway?   Protective monito ...

Protective Monitoring - An Introduction to GPG 13

IT Security in the Real World - A Value Proposition

  A graphical presentation that will provide& ...

IT Security in the Real World - A Value Proposition