Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Oct 2014

    The Seven Stages of Advanced Threats

    Today's advanced threats occur in "kill chains" of up to seven stages. These attacks easily evade traditional filtering and anti-virus defences to steal your organisation’s valuable data. Advanced threats can be stopped at any stage — if you deploy the proper cybersecurity solutions. We've prepared a report to...

    Sponsored By Websense

  • White Papers // Oct 2014

    Flash Storage For Dummies (South Africa)

    Flash technology is making quite a splash in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives, flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments running mission-critical, I/Ointensive applications. Find out more...

    Sponsored By NetApp

  • White Papers // Oct 2014

    Want to get “Flashed” by NetApp?

    Flash technology is making quite a splash in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives, flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments running mission-critical, I/O intensive applications. Find out more...

    Sponsored By NetApp

  • White Papers // Oct 2014

    Want to get “Flashed” by NetApp?

    Flash technology is making quite a splash in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives, flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments running mission-critical, I/O intensive applications. Find out more...

    Sponsored By NetApp

  • Videos // Oct 2014

    Case Study: TESCO uses CA Solutions to Monitor, Manage and Grow Their Business

    Check out these videos to see how Tesco has found success with CA’s solutions.

    Sponsored By CA Technologies

  • White Papers // Oct 2014

    It’s all about the App: Mobile Security that helps enable the business

    Mobile applications are hot, but the development and externalisation of services to the mobile platform comes with risk. For many, concerns over security, privacy and platform variation stand in the way of mobile app initiatives. Learn how your organisation can leverage mobile securely and efficiently.

    Sponsored By CA Technologies

  • Videos // Oct 2014

    The New Security

    It’s as much about ensuring consumer confidence as it is about defense and protection—CA security software helps you do both with accelerated app delivery and improved customer engagement with strong and proven enterprise security.

    Sponsored By CA Technologies

  • White Papers // Oct 2014

    IT and Enterprise Mobility: IT is Fully Charged and Ready to Roam

    To understand what large organisations are doing on enterprise mobility, CA Technologies engaged research firm Vanson Bourne to survey 1,300 senior I.T. decision-makers at enterprise organisations across five industry verticals in 21 different countries in the US, Europe, Asia and Australia.

    Sponsored By CA Technologies

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    Following the Rules - Reducing the Risk

    A short article by AIIM on compliance

    Sponsored By IBM

  • White Papers // Sep 2014

    Buyer Brief- Improving the Management and Governance of Unstructured Data

    Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition

    Sponsored By IBM

  • White Papers // Sep 2014

    Information Lifecycle Governance Leader - Reference Guide

    Data is growing at unprecedented rates. But how much of it is useful to your business? Read this leader guide from the Compliance, Governance and Oversight Council (CGOC) to learn how to deal with excessive data, get more value from information assets, control costs, ensure compliance, and reduce risk.

    Sponsored By IBM

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Sponsored By Webroot

  • White Papers // Sep 2014

    ThreatBrief - CryptoLocker Your Money or Your Life

    Cryptolocker is a nasty bit of ransomware that encrypts all your files and holds them hostage . It’s been wreaking havoc worldwide since September 2013 – but we see a new variant every few weeks. Find out how Webroot SecureAnywhere solutions uses cloud-based behavioral intelligence to discover new malware and...

    Sponsored By Webroot

  • White Papers // Sep 2014

    Application Usage Threat Report 2014

    The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on...

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    It's A Hybrid Cloud World. Are You Managing Your Hybrid State?

    If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. In January 2014, Forester Consulting evaluated the state of enterprise hybrid cloud environments and how they are being managed....

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

    Sponsored By Symantec

  • White Papers // Sep 2014

    Secure Archive: Maximize Primary Storage ROI & Data Protection

    This white paper looks at how secure archive solutions ensure archived data remains secure and maintains integrity, whether it’s stored for days or decades. Read more...

    Sponsored By Nexsan by Imation

  • White Papers // Sep 2014

    The rise of Mobile Access to your ERP Data

    Mobile user access to ERP and other back office systems has become a core requirement as organizations seek operational efficiency and deepening customer engagement. Without mobile access, system users are disadvantaged by needing to return to a desktop, often after a job is completed, to enter data relating to that...

    Sponsored By Epicor

  • White Papers // Sep 2014

    How We Define a Network is about to Change, Again

    VMware NSX does for networks and physical network components what virtual machines did for data centers and physical servers. It allows you to use them in very different and more flexible ways. In this white paper, you’ll learn how VMware NSX changes the way you build, manage, and secure your...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    Forrester: Customer-Focused Organizations Must Take a Strategic Approach to Identity Relationship Management

    Customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before. Forrester finds that to achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity. Fortunately, a...

    Sponsored By ForgeRock

  • White Papers // Sep 2014

    Open Identity Stack: Forging a New Future with Identity Relationship Management

    Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as...

    Sponsored By ForgeRock

  • White Papers // Sep 2014

    Forrester: Why Customer-Focused Organizations Must Take a Strategic Approach to Identity Relationship Management

    Customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before. Forrester finds that to achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity. Fortunately, a...

    Sponsored By ForgeRock

  • White Papers // Sep 2014

    ForgeRock Open Identity Stack

    Identity and Access Management (IAM) services were traditionally built for a company's internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as...

    Sponsored By ForgeRock

  • White Papers // Sep 2014

    Executive Summary: The Gathering Threat

    Enterprises today are seeing a rapid growth of unstructured content and an increased variety of content types, making consistent and secure management of corporate information increasingly difficult. As data continues to expand, it threatens to overwhelm IT infrastructures and leave organizations vulnerable to risk and non-compliance.

    Sponsored By OpenText

  • White Papers // Sep 2014

    Infographic: The Gathering Threat

    A dangerous storm is threatening to swap IT infrastructures. Massive growth of unrestricted content and multiplying content types make it increasingly difficult to consistently manage and identify what to keep. Email, file systems content, digital assets, social, web, ERP data... the list is endless and the threat is real.

    Sponsored By OpenText

  • White Papers // Sep 2014

    Comprehensive Enterprise Mobile Management for iOS 8

    The new iOS 8 release includes new features to facilitate device and application management but a third-party enterprise mobility management platform is still necessary for enterprises to gain full control over all their mobile devices and to capitalize on productivity features that enable workflow integration among apps. This white paper...

    Sponsored By Citrix Online

  • White Papers // Sep 2014

    Horizon View 6 Blast Performance Features

    With VMware's recent release of the Horizon Suite (specifically View 6), VMware has taken the performance and usability features and put them all under the Blast moniker. This category of features is grouped from a marketing perspective but will retain their technical terms in the documentation, similar to how the...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    Security and the Rise of Machine-to-Machine (M2M) Communications

    Increased interconnectivity via machine-to-machine (M2M) communications, the IoE, and smart systems holds profound implications for how business trends continue to evolve. In terms of M2M growth, key developments in security will be essential, from the design and manufacture of devices to more robust cloud security and ensuring the integrity of...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    The Packet Delivery Process: Remotely Connected Hosts

    Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    The Packet Delivery Process: Locally Connected Hosts

    Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    Checklist for Cloud Mobility Readiness

    Are you trying to determine the readiness of your enterprise’s content mobility solution? Today’s mobile worker want real-time, remote and secure access to your enterprise’s fast-growing information. To ensure the right data is in the right place at the right time, your organization needs a solution that provides your workforce...

    Sponsored By Hitachi

  • White Papers // Sep 2014

    Workforce Mobility Comparison Guide

    Are you challenged to find a mobile solution that enables employees to safely create and share content without compromising your enterprise’s security? With the rise of BYOD in the workplace, IT decision makers are faced with finding ways to securely deliver file synchronizations capabilities. The limitations of traditional file...

    Sponsored By Hitachi

  • Case Studies // Sep 2014

    Global Insurance Company Tackles Fraud Detection On-Site With Hitachi Content Platform Software

    Is your enterprise looking for ways to reduce storage costs and delay capital expenditures (capex) with highly scalable public cloud computing services? Today’s top cloud services support enterprises with data encryption, tiering options and attractive, pay-as-you-go pricing. While public cloud services can cut storage costs, they are not cost-effective...

    Sponsored By Hitachi

  • Research // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Sponsored By MobileIron

  • White Papers // Sep 2014

    Uncover the Truth About Hybrid Clouds

    It’s time to debunk the myths about hybrid cloud bandwidth and reliability. As the flexibility and economy of scale in the cloud continue to expand, and as visibility into data and systems becomes even more extensive, the case for the hybrid cloud has never been stronger. Get insights about your...

    Sponsored By Equinix

  • White Papers // Sep 2014

    Implement the Best Cloud for Your Business

    Find the best route for your business to adopt the cloud as an integral part of a hybrid IT architecture. Learn how different hybrid clouds and communication paths can work for you, as well as how to maximize benefits and minimize risks for your organization.

    Sponsored By Equinix

  • White Papers // Sep 2014

    The Importance of Interconnectivity

    The Internet of Everything is bringing exciting growth to the digital world. But sometimes that growth can mean latency, bandwidth and security challenges for companies that aren’t prepared. To succeed, you’ll need to be better connected than your competitors. Read our interconnectivity infopaper to find out how tapping into our...

    Sponsored By Equinix

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify