Cloud Whitepapers

Transforming Cloud Datacenter Security for Business Mobility Using Smart Networking

Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as

Case Study: how Leroy Merlin implemented Ilex’s SSO solution for its stores workers

Leroy Merlin’s first collaboration with Ilex International was based on the implementation of contactless authentication and SSO on shared workstations in its stores. Today, Leroy Merlin continues to modernise its employees’ work environment by providing them with the same user comfort on tablets. The challenges faced by Leroy Merlin: Modernise the work environment of sales

Ilex- IAM challenges solved: 4 real examples

Four real examples of how organisations have solved identity and access management (IAM) challenges Choosing the right Identity and access management solution solves a variety of risk management, resourcing, control and compliance issues. Know who has access to sensitive data and applications Make passwords work for both business users and security professionals Maintain complete visibility

Breach Confidence Index

The Breach Confidence Index is a benchmark survey created to monitor the level of confidence that businesses have when it comes to security breaches. This report reveals the current level of confidence, the number of businesses owning up to an attack and the reasons they have suffered security breaches. The report aims to offer advice

Rethinking Business Continuity with the Cloud

Technology developments and virtualisation have created huge potential for what can be achieved with businesses’ continuity and disaster recovery plans. Recent developments in enterprise technology mean that organisations need to radically rethink their approach to disaster recovery and create new solutions that are more flexible, scalable and cost-effective.

Security and privacy in a Hosted Exchange environment

When it comes to deploying Microsoft Exchange, businesses are turning to the cloud in increasing numbers. That’s because the cloud enables them to extend fully featured Exchange functionality without investing capital into extensive on-premise hardware and software deployments. But not all exchange clouds are created equal. As you consider hosted Exchange providers or even on-premise