Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Mar 2015

    The Cyber-Resilient Enterprise - Harnessing Your Security Intelligence

    An important shift has occurred in the security landscape of late. To keep pace in an ever more competitive world, businesses are adopting new ways of doing business, making them more dependent than ever on connected services and exposing them to new security challenges This paper details to IT leadership...

    Sponsored By Symantec

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe the...

    Sponsored By Symantec

  • White Papers // Mar 2015

    M-Trends 2015 - A View from the Front Lines

    While we have seen modest gains in organizations’ ability to overcome the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. The M-ternds report by Mandiant, provides a brief overview of the how attackers’ motives and tactics changed in 2014....

    Sponsored By FireEye

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Sponsored By Symantec

  • White Papers // Mar 2015

    Endpoint Buyers Guide

    Evaluating the many components that make up an endpoint security solution can be overwhelming. This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

    Sponsored By Sophos

  • White Papers // Mar 2015

    Firewall Buyers Guide

    Five key areas to consider when choosing your next firewall Checklist of the security capabilities you need Questions to ask vendors to make sure they meet your requirements Comparisons of Sophos, Fortinet, Dell SonicWALL and WatchGuard

    Sponsored By Sophos

  • White Papers // Mar 2015

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • White Papers // Mar 2015

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority - security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

    Sponsored By Sophos

  • White Papers // Mar 2015

    Life Hacker: Making Mobility Real –eBook

    Let Life Hacker take you through the questions most frequently asked when talking about mobility in organisations around the world. This eBook, chapter by chapter, will examine: • Why Mobility Policy are now a must have • How to remain secure in this world of BYOD • What Mobile...

    Sponsored By Dell and Intel

  • Videos // Feb 2015

    25 years of Firewall. What's Next?

    Over the past 25 years Firewalls have evolved to become one of the must-have cyber security solutions of today. But, are they ready to deal with the security threats of the next 25 years? Join James Turner, Senior Advisor and IT Security Analyst at IBRS Australia, and examine the new...

    Sponsored By Intel Security McAfee

  • White Papers // Feb 2015

    Don't Supersize. Optimize. Is your printing solution too big?

    With all the new and exciting digital technologies on the market, it can be easy for IT departments to forget about more established elements of their infrastructure, such as printers, multifunction printers (MFPs), and document management systems. Nevertheless, it is important that they continually evaluate all aspects of their IT...

    Sponsored By Brother

  • White Papers // Feb 2015

    Reduce backup costs with high-density energy-smart storage (Italian Content)

    Bottom line—your IT infrastructure simply has to work, despite constrained budgets and constant data growth. Fortunately, virtualization has driven sweeping change, making deployments simpler, more scalable and agile regardless of the data center’s size. Discover how best-of-breed storage solutions are maximizing the benefits of virtualization by creating quantifiable improvements in...

    Sponsored By Nexsan by Imation

  • Webcasts // Feb 2015

    Live Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Research // Feb 2015

    Definitive Guide to Advanced Threat Protection

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Sponsored By FireEye

  • White Papers // Feb 2015

    The Numbers Game Infographic - How Many Alerts is too Many to Handle

    Security alerts come in by the thousands every month, and you and your IT team are tasked with handling each one. Even when alerts are caught and categorized correctly, the sheer volume is overwhelming. And when they’re not responded to quickly, the consequences can be disastrous. This Infographic report illustrates...

    Sponsored By FireEye

  • White Papers // Feb 2015

    Maginot Revisited - More Real-World Results from Real-World Tests

    Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. In May 2014, FireEye and Mandiant, a FireEye company, published “Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model.” The first-of-its-kind study examined data from more than 1,200 security deployments...

    Sponsored By FireEye

  • White Papers // Feb 2015

    Hacking the Street - FIN4 Likely Playing The Market

    FireEye is currently tracking a group that targets the email accounts of individuals privy to the most confidential information of more than 100 companies. The group, which we call FIN4, appears to have a deep familiarity with business deals and corporate communications, and their effects on financial markets. This report...

    Sponsored By FireEye

  • White Papers // Feb 2015

    Increasing Agility and Speed to Drive Business Growth

    Major changes in the way businesses operate today require the adoption of new approaches to IT. In most cases, companies that want to remain competitive must deploy and leverage hybrid cloud environments, increase their analytics capabilities, extend services to mobile workers and customers, make more efficient use of social media...

    Sponsored By IBM

  • White Papers // Feb 2015

    Mobile Security: Confidence Ebbs as BYOD Booms

    Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing...

    Sponsored By Dell

  • White Papers // Feb 2015

    10 Best Practices For implementing a successful BYOD Program

    A large number of Good Technology’s global 5000 customers have embraced BYOD and shared their experiences with us. As a result we bring you the top ten best practices for the successful implementation of your own BYOD program. Read More...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    7 Must Haves For Mobile App Security

    Having to trade usability against security puts enterprises in an unenviable position. In this white paper are the minimum requirements that an enterprise must have in a mobile app security solution in order to transform the mobile user experience without compromising on security. Read More...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    10 Recommendations To Optimize Mobile Migration Projects from leading Practitioners

    Across the entire migration project, Good Professional Services has developed many best practice recommendations as a result of their rich experience. Listed in this white paper are 10 recommendations that cut across people, processes, and technology for IT to consider when planning migration projects. Read More...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    5 Traps to avoid in your 2015 mobile App program

    Working with progressive early adopters of mobile apps, Good Technology has gained visibility into successful mobile app programs and deployments. We’ve also seen what traps impede success and/or attainment of planned goals. Below are five (5) pitfalls to avoid in your mobile app program and corresponding recommendations for success. Read...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    Moving beyond MDM to Mobile Apps

    Now that many organizations are on board with the basics of business mobility, users are hungry for more. Companies everywhere are turning to mobile business apps to empower employees on the go and kickstart productivity. But as these organizations move beyond Mobile Device Management (MDM), IT must ensure that the...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    Simplifying the Management of Macs and Mobile Devices

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory,...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Strengthen Security with Intelligent Identity and Access Management

    Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the...

    Sponsored By IBM

  • White Papers // Feb 2015

    When Millions Need Access: Identity MGMT in an Interconnected World

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Feb 2015

    Safeguard Mobile, Cloud and Social Access with Solutions from IBM

    IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.

    Sponsored By IBM

  • White Papers // Feb 2015

    Holistic Fraud Prevention: Transforming the Customer's Experience

    Financial institutions are on a perpetual quest to improve customer engagement to drive increased transactions, account balances, loyalty and ultimately, profitability. Providing exceptional service to online banking customers is particularly critical. Unfortunately, the imprecise, antiquated fraud controls that many financial institutions rely on are not only failing to protect...

    Sponsored By IBM

  • White Papers // Feb 2015

    Security on System z eGuide

    IBM System z security provides a core set of robust services such as cryptographic hardware, system integrity, EAL5 certification and more. While it might be the perfect place to store sensitive data and perform business critical transactions and analytics it can also be a target for would-be cyber criminal and...

    Sponsored By IBM

  • White Papers // Feb 2015

    Deliver Actionable Identity Intelligence with Solutions from IBM

    Integrated, intelligent IBM Security identity and access management solutions are designed to turn identity into the new security perimeter so organizations can better govern identities, gain control, and employ analytics in support of both security and regulatory compliance.

    Sponsored By IBM

  • White Papers // Feb 2015

    IBM Security Identity Governance and Administration

    IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

    Sponsored By IBM

  • White Papers // Feb 2015

    See Clearly in the Cloud with Threat-Aware Identity and Access Management

    Securely connect people, applications and devices to cloud environments While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is...

    Sponsored By IBM

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • White Papers // Feb 2015

    Infographic - Roadmap to Content Mobility: 5 Steps to Keeping your Data Safe

    Data security is getting more complicated. Compliance is touching more and more data and too much data is stored solely on user devices. You need data in the right place at the right time, with the visibility and control to ensure that it’s handled appropriately. Your path to secure...

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    Protecting Your APIs against Attack and Hijack

    The pressure is on to securely connect the enterprise to mobile apps, cloud platforms and developer networks through APIs. But it is a mistake to think you can secure APIs using the same methods and technology as before. APIs have an entirely unique risk profile that must be addressed....

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Five Simple Strategies for Securing APIs

    APIs might represent increased risk for the enterprise, but the potential benefits they bring to an organisation can overshadow any inherent dangers. Read this eBook to understand the 3 attack vectors or watch with APIs, and 5 simple strategies to secure your APIs.

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    Choosing the Right API Management Solution for the Enterprise User

    This whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery. Read now to also discover the basic functional areas of API management, including: API lifecycle management Developer enablement and community building API monetisation

    Sponsored By CA Technologies

  • White Papers // Feb 2015

    A How-to Guide to OAuth & API Security

    This informative whitepaper describes what OAuth is and how it fits into a complete API security solution. Read now to understand the complexity of implementing OAuth, and how you can make an OAuth implementation simple for your organisation.

    Sponsored By CA Technologies

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Sponsored By IBM

  • White Papers // Nov 2014

    Symantec Top Ten Tips for Cyber Resilience

    Increasing visibility into Cyber Risk and understanding its potential impact should be an essential element of an organisation’s strategy. Eliminating this risk is impossible and impedes agility. Accepting the right level of risk supports innovation. This is Cyber Resilience. Follow these easy 10 steps on how to secure your business...

    Sponsored By Symantec

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • White Papers // Dec 2014

    The Human Factor Report

    The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...

    Sponsored By Proofpoint

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Sponsored By Cisco Systems

  • White Papers // Nov 2014

    Preparing for Future Attacks: Implementing the Right Security Strategy Now

    Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order...

    Sponsored By Symantec

  • eBooks // May 2014

    Software Defined Storage for Dummies

    This book examines data storage and management challenges and explains software-defined storage, an innovative solution for high-performance, cost-effective storage using the IBM General Parallel File System (GPFS).

    Sponsored By IBM

  • White Papers // Dec 2014

    Analysis of Cybercrime Infrastructure

    Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime...

    Sponsored By Proofpoint

  • White Papers // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Sponsored By Symantec

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Jan 2015

    State of Security (Infographic)

    Cybercrime remains prevalent, and damaging threats from criminals continue to loom over businesses and consumers. During 2013, much attention was focused on cyber espionage, threats to privacy, and the acts of malicious insiders. However, the end of 2013 provided a painful reminder that cybercrime remains prevalent and that damaging...

    Sponsored By Symantec

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Sponsored By Cisco Systems

  • White Papers // Feb 2014

    Applying Agile Principles to the Development of Smarter Products

    Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.

    Sponsored By IBM

  • White Papers // Dec 2014

    2014 Global Report on the Cost of Cyber Crime

    The incidence and cost of cyber crime is escalating. The headlines show us that. But now the Ponemon Institute provides the numbers you need to plan and manage your investments in cyber security. One of the major findings of the 2014 Global Report on the Cost of Cyber Crime is...

    Sponsored By HP

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Sponsored By Symantec

  • White Papers // Mar 2014

    Managing Security Risks and Vulnerabilities​

    With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

    Sponsored By IBM

  • White Papers // Oct 2014

    Want to get “Flashed” by NetApp?

    Flash technology is making quite a splash in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives, flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments running mission-critical, I/O intensive applications. Find out more...

    Sponsored By NetApp

  • eBooks // Oct 2014

    Web Application Security for Dummies

    This book simply explains all about web application security. After reading this book you'll know how to use a web application security scanner to quickly find vulnerabilities and remediate them for stronger security. Learn more...

    Sponsored By Qualys

  • Videos // May 2014

    Video: 10 Critical Requirements for Cloud Applications

    Many application vendors now claim they're in the cloud. But being committed to this new delivery model requires more than just saying it. So what must-haves should you look for in a cloud vendor? Watch this video to see the 10 Critical Requirements for Cloud Applications.

    Sponsored By Workday

  • White Papers // Dec 2014

    The New Art of War: 2014 Targeted Attacks Study

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...

    Sponsored By Proofpoint

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Sponsored By IBM

  • White Papers // Aug 2014

    Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based access.

    Sponsored By IBM

  • eBooks // Mar 2014

    Integrating and governing big data

    While the term “big data” has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades, leading the way with data integration, management, security and analytics solutions known for their reliability, flexibility and scalability. The end-to-end information integration capabilities of IBM®...

    Sponsored By IBM

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Sep 2014

    An Automated, Application-Aware Foundation for the Modern Enterprise

    Enterprises have seen massive change over the last decade, but one thing has remained consistent: the Enterprise Network. This article provides insight on an adaptable and programmable network platform to stay ahead of enterprise trends such as BYOD, Cloud Adoption and Xaas

    Sponsored By Cisco Systems

  • White Papers // Sep 2014

    Checklist for Cloud Mobility Readiness

    Are you trying to determine the readiness of your enterprise’s content mobility solution? Today’s mobile worker want real-time, remote and secure access to your enterprise’s fast-growing information. To ensure the right data is in the right place at the right time, your organization needs a solution that provides your workforce...

    Sponsored By Hitachi

  • White Papers // Feb 2015

    Internet Security Threat Report 2014

    Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Internet Security Threat Report 2014 covers the wide-ranging threat landscape, with data...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

    Sponsored By Symantec

  • White Papers // Feb 2014

    The Right Time for Real-time Marketing

    Deliver more relevant offers, increase response rates, and create happier, more profitable customers.

    Sponsored By IBM

  • White Papers // Feb 2014

    The Who, What, Where, When and How of Real-time Personalization

    Read this white paper to find out what the most forward-thinking marketers are doing to leverage the power of real-time personalization, and discover what it takes to build an effective, comprehensive marketing strategy of your own.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for Security Information and Event Management

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Dec 2014

    Mobile Risk Report - Forbes list of Global 2000

    The Mobile Risk Report presents the major findings of HP Security Research’s comprehensive dive into today’s cyber vulnerability and mobile threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses. Download this report to know the report findings of more than...

    Sponsored By HP

  • White Papers // Dec 2014

    IT Security: Midsize Businesses Face Enterprise-Caliber Threats

    The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize organisations often lack the sophisticated defenses of large enterprises, many fail to recognise their vulnerability and are overconfident in their ability...

    Sponsored By HP

  • White Papers // Jan 2015

    2014 Cost of Cyber Crime Study: Australia

    The incidence and cost of cyber crime in Australia is escalating. The headlines show us that. But now the Ponemon Institute provides the numbers you need to plan and manage your investments in cyber security. One of the major findings of the 2014 Cost of Cyber Crime study for Australia...

    Sponsored By HP

  • White Papers // Jun 2014

    Securing and controlling data in the cloud

    The Securing and Controlling Data in the Cloud white paper evaluates the • benefits of cloud computing, • the security challenges posed by the cloud, • provides recommendations to secure and control sensitive data in cloud environments.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Secure sensitive data encryption tech guide

    This report surveys the various encryption approaches for securing data at rest to understand what the technology does along with where each provides an optimal fit. After comparing the various encryption technologies, this paper explains why file level transparent data encryption provides the optimal balance of data type coverage, security,...

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Securing Big Data

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Oct 2014

    Eight Must-Have Features for Ultimate Network Security Resource Optimization

    The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your...

    Sponsored By McAfee

  • White Papers // Jul 2014

    Enhancing Cloud Connectivity For Optimal Application Performance

    Increasing dependence on Cloud-based applications hosted in distant data centres makes the quality of backbone networks connecting them increasingly critical. Network quality between Cloud providers and end-users in fact widely varies, and chronically threatens application performance. Differences in carrier network design become more significant as dependence on the Cloud intensifies....

    Sponsored By Level 3 Communications