Latest Advisory

Modern Information Management. Manage-in-Place Vendor Summary 2025
Managing information where it lives, known as manage-in-place, requires understanding diverse technical architectures to select the right governance strategy.

Modern Information Management. Manage-in-Place Vendor Summary 2025
Managing information where it lives, known as manage-in-place, requires understanding diverse technical architectures to select the right governance strategy.

Why SIAM Expands Beyond ITSM and Who Needs to Know
Have an outsourced, integrated, multi-vendor IT delivery model? Then ITSM is not enough to ensure you have a smooth running environment during critical events.

How to Develop an Effective Information Architecture
How many organisations are carrying technical debt in their holding of information. Do they need to hold the information they do, is it accessible, and are they in breach of the law holding information that is no longer needed? This advisory paper will assess how organisations can solve this problem.

Startup CIO Shares Proven Strategies for IT Leaders
Veteran CIO Sourav Sinha shares proven strategies for enterprise IT leaders to align and streamline their technology with business needs, based on his experience at a startup.

VENDORiQ: Graph-Based Retrieval-Augmented Generation: Business Impact of GraphRAG Release
Earlier this year, GraphRAG transformed retrieval-augmented generation (RAG) with its graph-based approach for question-answering over private datasets. Now, Microsoft has made GraphRAG available on GitHub, offering a user-friendly API on Azure—ready to enhance your AI-powered RAG projects. Interested in exploring its capabilities?

Leveraging Password Managers Successfully
Passwords will be in use for a long time yet. Make sure good practices are in place for their use.

Data Egress from Enterprises
Sensitive information should be kept confidential and not readily accessible. How can enterprises know what data is leaving, where it’s going, and who has access to it? IBRS outlines solutions to prevent data leaks and ensure external information security.