Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Mar 2015

    State of Public Cloud Security

    The majority of organisations using the cloud today don’t understand their shared security responsibilities, according to a recent survey by Forrester Consulting. This finding is alarming, especially with the constant revelations of major data breaches. Whether you’re just starting your cloud journey and want to know how others are approaching...

    Sponsored By Trend Micro Australia

  • White Papers // Mar 2015

    How Secure Do You Want To Be - Evaluating and Evolving Your Security Program

    The Security Program Assessment follows a logical sequence of steps to help you answer the question “How secure do you want to be?” It starts with assessing your current situation based on 10 key areas, designing solutions to address the issues in your environment, creating a clear roadmap to transform...

    Sponsored By FireEye

  • White Papers // Mar 2015

    IBM Software: Safeguarding the cloud with IBM Dyamic Could Security

    Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics. Read More..

    Sponsored By IBM

  • White Papers // Mar 2015

    IBM Software: IBM Security Identity Governance and Administration

    IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle. Read More..

    Sponsored By IBM

  • White Papers // Mar 2015

    IBM Software See clearly in the cloud with threat-aware identity and access management

    Securely connect people, applications and devices to cloud environments While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is...

    Sponsored By IBM

  • White Papers // Mar 2015

    M-Trends 2015 - A View from the Front Lines

    While we have seen modest gains in organizations’ ability to overcome the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. The M-ternds report by Mandiant, provides a brief overview of the how attackers’ motives and tactics changed in 2014....

    Sponsored By FireEye

  • White Papers // Mar 2015

    Addressing the Cyber Kill Chain - Are you prepared?

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these attacks and how cybercriminals approach them is key to ensuring your organization is protected. Understanding the Cyber Kill Chain model and how...

    Sponsored By Proofpoint

  • White Papers // Mar 2015

    The Cyber-Resilient Enterprise - Harnessing Your Security Intelligence

    An important shift has occurred in the security landscape of late. To keep pace in an ever more competitive world, businesses are adopting new ways of doing business, making them more dependent than ever on connected services and exposing them to new security challenges This paper details to IT leadership...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Sponsored By Symantec

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Infrastructure Matters: Cloud Security Overview

    This solution overview guide explores how secure the cloud really is, and how Fujitsu services are designed to ensure your information is protected at every level. Read More..

    Sponsored By Fujitsu

  • White Papers // Mar 2015

    Infrastructure Matters: Disaster Recovery Overview

    This solution overview guide demonstrates how our services can help to give your users the level of data availability they have come to expect everywhere else. Read More..

    Sponsored By Fujitsu

  • White Papers // Mar 2015

    Infrastructure Matters: Data Protection Overview

    Whether you have already thought about a value-based approach or would like help shifting away from the costbased model, our services will help you apportion the right data protection and manage your storage more effectively as a result. Read More..

    Sponsored By Fujitsu

  • White Papers // Mar 2015

    Endpoint Buyers Guide

    Evaluating the many components that make up an endpoint security solution can be overwhelming. This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

    Sponsored By Sophos

  • White Papers // Mar 2015

    Firewall Buyers Guide

    Five key areas to consider when choosing your next firewall Checklist of the security capabilities you need Questions to ask vendors to make sure they meet your requirements Comparisons of Sophos, Fortinet, Dell SonicWALL and WatchGuard

    Sponsored By Sophos

  • White Papers // Mar 2015

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably - so it's easy to get confused about which type of protection is right for you. This Manager's Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • White Papers // Mar 2015

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority - security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

    Sponsored By Sophos

  • White Papers // Mar 2015

    Life Hacker: Making Mobility Real-eBook

    Let Life Hacker take you through the questions most frequently asked when talking about mobility in organisations around the world. This eBook, chapter by chapter, will examine: • Why Mobility Policy are now a must have • How to remain secure in this world of BYOD • What Mobile...

    Sponsored By Dell and Intel®

  • White Papers // Feb 2015

    Don't Supersize. Optimize. Is your printing solution too big?

    With all the new and exciting digital technologies on the market, it can be easy for IT departments to forget about more established elements of their infrastructure, such as printers, multifunction printers (MFPs), and document management systems. Nevertheless, it is important that they continually evaluate all aspects of their IT...

    Sponsored By Brother

  • Videos // Feb 2015

    25 years of Firewall. What's Next?

    Over the past 25 years Firewalls have evolved to become one of the must-have cyber security solutions of today. But, are they ready to deal with the security threats of the next 25 years? Join James Turner, Senior Advisor and IT Security Analyst at IBRS Australia, and examine the new...

    Sponsored By Intel Security

  • White Papers // Feb 2015

    Reduce backup costs with high-density energy-smart storage (Italian Content)

    Bottom line—your IT infrastructure simply has to work, despite constrained budgets and constant data growth. Fortunately, virtualization has driven sweeping change, making deployments simpler, more scalable and agile regardless of the data center’s size. Discover how best-of-breed storage solutions are maximizing the benefits of virtualization by creating quantifiable improvements in...

    Sponsored By Nexsan by Imation

  • Research // Feb 2015

    Definitive Guide to Advanced Threat Protection

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Sponsored By FireEye

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • White Papers // Feb 2015

    The Numbers Game Infographic - How Many Alerts is too Many to Handle

    Security alerts come in by the thousands every month, and you and your IT team are tasked with handling each one. Even when alerts are caught and categorized correctly, the sheer volume is overwhelming. And when they’re not responded to quickly, the consequences can be disastrous. This Infographic report illustrates...

    Sponsored By FireEye

  • White Papers // Feb 2015

    Maginot Revisited - More Real-World Results from Real-World Tests

    Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. In May 2014, FireEye and Mandiant, a FireEye company, published “Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model.” The first-of-its-kind study examined data from more than 1,200 security deployments...

    Sponsored By FireEye

  • White Papers // Feb 2015

    Hacking the Street - FIN4 Likely Playing The Market

    FireEye is currently tracking a group that targets the email accounts of individuals privy to the most confidential information of more than 100 companies. The group, which we call FIN4, appears to have a deep familiarity with business deals and corporate communications, and their effects on financial markets. This report...

    Sponsored By FireEye

  • White Papers // Feb 2015

    Increasing Agility and Speed to Drive Business Growth

    Major changes in the way businesses operate today require the adoption of new approaches to IT. In most cases, companies that want to remain competitive must deploy and leverage hybrid cloud environments, increase their analytics capabilities, extend services to mobile workers and customers, make more efficient use of social media...

    Sponsored By IBM

  • White Papers // Feb 2015

    Mobile Security: Confidence Ebbs as BYOD Booms

    Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing...

    Sponsored By Dell

  • White Papers // Feb 2015

    10 Recommendations To Optimize Mobile Migration Projects from leading Practitioners

    Across the entire migration project, Good Professional Services has developed many best practice recommendations as a result of their rich experience. Listed in this white paper are 10 recommendations that cut across people, processes, and technology for IT to consider when planning migration projects. Read More...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    5 Traps to avoid in your 2015 mobile App program

    Working with progressive early adopters of mobile apps, Good Technology has gained visibility into successful mobile app programs and deployments. We’ve also seen what traps impede success and/or attainment of planned goals. Below are five (5) pitfalls to avoid in your mobile app program and corresponding recommendations for success. Read...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    7 Must Haves For Mobile App Security

    Having to trade usability against security puts enterprises in an unenviable position. In this white paper are the minimum requirements that an enterprise must have in a mobile app security solution in order to transform the mobile user experience without compromising on security. Read More...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    10 Best Practices For implementing a successful BYOD Program

    A large number of Good Technology’s global 5000 customers have embraced BYOD and shared their experiences with us. As a result we bring you the top ten best practices for the successful implementation of your own BYOD program. Read More...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    Moving beyond MDM to Mobile Apps

    Now that many organizations are on board with the basics of business mobility, users are hungry for more. Companies everywhere are turning to mobile business apps to empower employees on the go and kickstart productivity. But as these organizations move beyond Mobile Device Management (MDM), IT must ensure that the...

    Sponsored By Good Technology

  • White Papers // Feb 2015

    Simplifying the Management of Macs and Mobile Devices

    A single, unified solution for managing Macs and mobile devices, Centrify Identity Service, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory,...

    Sponsored By Centrify

  • White Papers // Feb 2015

    Strengthen Security with Intelligent Identity and Access Management

    Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the...

    Sponsored By IBM

  • White Papers // Feb 2015

    When Millions Need Access: Identity MGMT in an Interconnected World

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Feb 2015

    Safeguard Mobile, Cloud and Social Access with Solutions from IBM

    IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.

    Sponsored By IBM

  • White Papers // Feb 2015

    Holistic Fraud Prevention: Transforming the Customer's Experience

    Financial institutions are on a perpetual quest to improve customer engagement to drive increased transactions, account balances, loyalty and ultimately, profitability. Providing exceptional service to online banking customers is particularly critical. Unfortunately, the imprecise, antiquated fraud controls that many financial institutions rely on are not only failing to protect...

    Sponsored By IBM

  • White Papers // Feb 2015

    Security on System z eGuide

    IBM System z security provides a core set of robust services such as cryptographic hardware, system integrity, EAL5 certification and more. While it might be the perfect place to store sensitive data and perform business critical transactions and analytics it can also be a target for would-be cyber criminal and...

    Sponsored By IBM

  • White Papers // Feb 2015

    Deliver Actionable Identity Intelligence with Solutions from IBM

    Integrated, intelligent IBM Security identity and access management solutions are designed to turn identity into the new security perimeter so organizations can better govern identities, gain control, and employ analytics in support of both security and regulatory compliance.

    Sponsored By IBM