White Papers: Security

Cyber security is an ever-moving target, particularly as the enterprise’s perimeter becomes more flexible in the mobile era and the threats evolve. Here we offer papers to help the IT security professional.

Hazlewoods Accounts and Business Advisers Case Study

As a result of substantial growth in its client base over the past few years, Hazlewoods decided it was time to overhaul its data protection and disaster recovery capabilities. Cristie Data delivered a cloud-based backup solution, with a dedicated disaster recovery environment and now multiple backups can be completed during the working day, with minimal impact […]

Clifton College Case Study

Clifton College was established in 1862 and is one of the UK’s leading independent schools. Although it has a rich history, it wants to be forward looking in its approach to IT and cloud solutions. The College was experiencing lots of issues with its existing backup solution and enlisted the help of Cristie Data. This […]

A new angle on cybersecurity

BlackBerry® software provides the embedded intelligence to secure the EoT, so that the IoT can thrive. These are just a few of the capabilities of BlackBerry software: BlackBerry® Cybersecurity consulting solutions combine the very latest advances in endpoint security, as well as access to a constant flow of new thinking and new innovations BlackBerry® UEM manages your diverse and […]

Datto’s European State of the Channel Ransomware Report

Datto’s State of the Channel Ransomware Report is comprised of statistics pulled from a  survey of nearly 300 managed service providers (MSPs), our partners and customers, across Europe. The report provides unique visibility into the state of ransomware from the perspective of the IT Channel and their SMB clients who are dealing with these infections on a daily […]

Key Principles and Strategies for Securing the Enterprise Cloud

Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises (end-users) own the security for everything  that […]

Secure SD-WAN: Integrated NGFW Integration with WAN Transformation

Adoption of Cloud Services, SaaS applications and mobile workforce and putting increasing strain on the corporate network. This is exacerbated as organisations look to better connect their remote and branch office employees and offer them higher quality network services. Enterprises are turning to SD-WAN, a more agile, responsive and cost-effective solution as compared to traditional […]

Migration to Exchange Online and Office 365: A Step-by-Step Guide

The use of Office 365 across the globe is growing rapidly, driven by the intense sales focus of Microsoft and its business partners, along with a clear value proposition for organizations of all sizes. While the uptake of Exchange Online is leading the early growth charge, there are significant opportunities for organizations to leverage the […]

How to Spot Insider Threats Before They Wreak Havoc

Everyone knows the classic horror movie plot: The heroes rush to barricade the doors and windows, only to discover that the monster is already inside the house. If you’re an IT security pro, you might want to watch one of these flicks again and reflect on how it applies to your job. Too many organizations today spend […]

GDPR Business Brief

With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions, most notably the European Union (EU), which has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of […]

Cylance 2017 Threat Report

The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide.