•  > 
  • Blog
  •  > 
  • Blog
  •  > 
  • Blog

Blog

Six Reasons You Need Discovery

The question that gets to the heart of this is: “Are you confident you know what you’ve got lurking around your networks, and where?” However, this risks oversimplifying what is an incredibly versatile business asset. Let’s examine where we are today, and why Discovery is a tool you should be relying on. So what are typical use cases for intelligent discovery software?                                      

Read More

Do you have visibility across your network?

How much confidence do you have that you know what’s lurking in the dark corners of your server room, or in that datacenter you only just realised you’re still paying for? What about sensitive data uploaded to a semi-public cloud that really the HR department should have stopped using several years ago? Efficiency savings, regulatory compliance and a tight security posture are all top priorities for any IT leader. But visibility underpins them all. 

Read More

Why you should consider outsourcing your data protection officer (DPO)

Whether you’ve already got a DPO in place, or are still trying to find a candidate with suitable experience, an outsourced DPO-as-a-service is something many SMEs are turning to to fill gaps with parental leave or holiday cover, or in cases where organisations don’t require the services of a full-time professional. Let’s examine a couple of the key reasons people look at this option.

Read More

What goes into a data audit?

It seems to happen almost weekly nowadays: another massive brand hit by a data breach, with no real understanding of how or when it happened, or how many people are affected. The media - and the information management community - have been waiting for a GDPR test case since the legislation was first dreamt up. We sat down with Simon Parkinson, COO at Dot Group, to talk data maps, asset registers, subject access requests and other tricks that ought to go some way towards keeping you and your organisation out of the headlines!

Read More

Don’t be floored by GDPR’s Subject Access Requests

Subject Access Requests, or SARs, may not be new - they came in under the Data Protection Act in 1998 - but the recently enforced GDPR goes some distance further, cutting the time given to respond to requests, doing away with application fees and famously, hiking fines up to 4% of turnover or €20 million, whichever is higher.

Read More

Utopia in IT Service Management


As the average organisation’s IT stack becomes more and more complex, well-delivered IT service management (ITSM) is increasingly mission critical to the business. ITSM gives an IT department a way to improve internal processes, address and understand the individual needs of different business units, provide more value to its customers, and ultimately move the organisation forward. It is usually the primary point of interaction between an IT department and the rest of an organisation, and as such is vital to get right. In this article, we’ll take a look at what’s coming round the corner in service management, and how you can benefit today.

Read More