ISO 27001: An Introduction
Why do people get ISO 27001 certified? What does it mean? What is the value? Check out this brief introduction to ISO 27001. Responsiv Cloud is hosted in an ISO…
Why do people get ISO 27001 certified? What does it mean? What is the value? Check out this brief introduction to ISO 27001. Responsiv Cloud is hosted in an ISO…
Introduction Sustainability is a growing focus and responsibility for all organisations. Environmental, Social, and Governance (ESG) reporting is a growing requirement, with providers developing tools to produce the required reports. …
Introduction Building Societies, like any organisation, need to keep up with technology to stay in business and satisfy customer needs. 67% of senior [building society] leaders see digital transformation as…
Introduction The public sector is constantly under pressure to do more with less. Pressure is driven by taxpayers, legislators, governors, and mayors, as they fight for popularity through lower costs….
This Bank has a regulatory demand to conform with the Sarbanes-Oxley (SOX) regulation. This means that data managed by operational databases must be monitored in a way that cannot be…
Introduction Process mapping is a great tool to allow businesses to discover, capture and document their business processes so that they can be analysed and refined. This POV will outline…
Introduction Responsiv has deep Red Hat skills and expertise, our credentials include certification and skill within the Red Hat portfolio and Red Hat partner program. Our team of technical experts…
Introduction Local councils play a crucial role in providing services that directly interact with and impact residents. These interactions range from regular service provisions such as bin collections to specific…
Introduction The accessibility and convenience of shopping online has seen retailers shifting their focus to providing improved, custom, and omni-channel online experiences. Many retailers have increased their digital presence to…
Introduction Cloud security is a collection of procedures and technologies designed to address threats to business data (including staff, customer, supply chain, and competitive data) maintained in the cloud as…
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
No products in the cart.