Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • VMware invites you to the Network Virtualization event NV Innovate Online

    Webcasts // Jul 2016 // provided by VMware

    VMware would like to invite you to NV Innovate Online on Thursday, 11 August at 10:00 AM AEST. In this webinar event, VMware will discuss: How you can deliver the e​n​tire networking and security model in software, decoupled from traditional networking hardware without having to rip and replace. ...

    Register Now
  • Singtel: Security Information and Event Management (SIEM)

    White Papers // Jul 2016 // provided by Singtel

    As cyber threats are continually on the rise, it’s increasingly challenging for enterprises to protect their infrastructure.Security Information and Event Management provides round-the-clock monitoring and analysis with prioritised alert notifications. Find out SIEM can help protect your business and address a wide range of security issues that organisations are ...

    Download Now
  • Singtel: Managed Application Firewall Service

    White Papers // Jul 2016 // provided by Singtel

    In today’s IT Security environment, legacy firewalls are no longer effective and threats can pass right through the majority of an enterprises defence. While many applications help improve user and business productivity, there are other applications that consume large amounts of bandwidth, pose needless security risks, and increase business liabilities. ...

    Download Now
  • The Convergence of Management and Security in a User-Driven World

    White Papers // Jul 2016 // provided by Heat Software

    IT service management 2.0 tools focus on improving the quality and efficiency with which infrastructure and operations supports end users and delivers services. There is broad consensus that ITSM 2.0 initiatives can not be limited to the service desk and that they must offer an integrated ...

    Watch Now
  • Test Report: Sophos Endpoint Protection & Sophos Cloud Endpoint Protection

    White Papers // Jul 2016 // provided by Sophos

    This test report looks into Sophos' endpoint security solutions and how they are easy to configure out of the box, designed for rapid access to common management and visibility tasks and how they are better able to deliver pre-configured, ready to use security functionality than other tested solutions.

    View this now
  • Switching to Next-Gen Endpoint Security

    White Papers // Jul 2016 // provided by Sophos

    Threats are becoming increasingly dynamic and forcing organizations to defend against both traditional malware and new advanced attacks. As a result, more and more organizations are making the switch to next-gen endpoint protection from Sophos to get the proven, innovative defense they need. This solution brief shows how Sophos Next-Gen ...

    View this now
  • IBM 2016 C-suite Study

    White Papers // Jul 2016 // provided by IBM

    The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on ...

    Read more
  • 2016 Cyber Security Intelligence Index

    White Papers // Jul 2016 // provided by IBM

    The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.

    Learn more
  • Why Efficacy is Paramount

    White Papers // Jul 2016 // provided by Webroot Software

    The endpoint security market is in the middle of a major upheaval, and many would argue it’s not before time. The endpoint antivirus model of having a large sophisticated endpoint client on each device, with updates to keep defenses current, has been ineffective for years, while new solutions have been ...

    Read more
  • Next-Generation Threats Exposed

    White Papers // Jul 2016 // provided by Webroot Software

    This documentation provides an overview of the internet threat landscape during 2015, spanning threats from websites, malicious IPs, malware, mobile applications and it focuses on identifying threat trends, including a comparison to those identified in the Webroot 2015 Threat Brief.

    Find out more