Data Protection Services Reference & Learning Page 3 - MicroscopeUK

Data Protection Services

Email Alerts

Register now to receive Microscope.co.uk-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • In-depth: Tips for selling security-as-a-service

    Billy MacInnes looks at the growing market for security-as-a-service and the reseller opportunities it presents. There's nothing intrinsically new about security-as-a-service. As Ian Kilpatrick, chairman at Wick Hill, points out, resellers have been ... 

  • In-depth: Security predictions for 2012 part two

    As we look to find out more about what the security market holds next year we canvas opinions from more industry players keen to share their insights. Derek Oliver, director and CEO of Ravenswood Consultants and co-chair of COBIT 5 Task Force provid... 

  • In-depth: Security predictions for 2012 part one

    To get an insight into what is on the horizon in the security market next year we have canvassed opinion from several companies to find out what those in the industry think is round the corner in 2012. David Gibson, Director of Technical Marketing a... 

  • In-depth: Technology to pitch in 2012

    by Billy MacInnes Last month, Gartner published its technology and trend predictions for the next few years and among the dominant trends were a greater move towards cloud computing and increasing consumerisation of IT. MicroScope asked a number of p... 

  • In-depth: Staying on the right side of the ICO

    Are you a business that holds personal information on staff or customers? If so, you need to be aware of a new Code of Practice recently published by the Information Commissioner's Office which offers guidelines on when data can be shared and how it ... 

  • In-depth: Securing the consumerisation drive

    One of the greatest challenges for any company at the moment is to embrace the trend to encourage and allow the consumerisation of IT but to do so while keeping the network safe and secure, writes Amro Gebreel. The growth in the bring your own device... 

  • In-depth: UTM and XTM, simply the best?

    Unified Threat Management UTM and its evolutionary counterpart Extensible Threat Management have long been regarded as one stop solutions for network security. But are SME's still embracing this technology or are separate products making a comeback? ... 

  • In-depth: Taking the fear out of the security sell

    When it comes to security, in whatever form it takes, fear is the key. Whether it's protecting your house against the threat of burglars or a country's borders against a projected invasion by a potentially bellicose neighbouring state, there's nothin... 

  • In-depth: The move to block access to social networking

    The message has been fairly consistently sounded across vendor land for resellers to embrace social networking and use it as a method of communicating with customers as well as giving the brand a human dimension. But there have always been nagging d... 

  • In-depth: Selling cloud without the scare factor

    There has always been one major hurdle holding back wider adoption of the cloud, the small matter of security. With data leaving a user's network and residing in the cloud the concerns over the protection around that information have often proved to ...