Tech Industry

Best practices for business technology. Whether it's infrastructure, mobile, security, or operational advice, you'll find leading experts and compelling insight here.

  • Data Theft Prevention: The Key to Security, Growth & Innovation

    White Papers // Apr 2016 // provided by Forcepoint

    The specter and cost of the recent high-profile data theft cases has had a chilling effect – and it’s just the beginning of a long-term trend. The lure of easy and substantial financial gain, as well as the explosion in the number of threat actors, all but guarantees that this ...

    Read more
  • A Guide to Corporate Social Media Security

    White Papers // Apr 2016 // provided by Proofpoint

    With rapid business adoption of social media as a core public communication channel, organizations are increasingly exposed to an array of internal and external security risks. Fraudulent Facebook accounts impersonate major brands to sell counterfeit products. Bogus LinkedIn profiles trick employees into divulging sensitive data. Corporate Twitter accounts are hijacked ...

    Download Now
  • How Credential Phishing is Changing — How to Stop It

    White Papers // Apr 2016 // provided by Proofpoint

    Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple: it works. Nearly one in four people who receive a phishing email open it, and more than 10% click on the malicious link or open the weaponised attachment that the ...

    Read more
  • Product Brochure: Managed Security Services (Endpoint and Email Protection)

    White Papers // Apr 2016 // provided by Singtel

    Explore the new integrated Endpoint Protection Suite, a cloud-based solution that makes it easy to deploy and manage endpoint security while blocking malware across all devices. Defending your business against malicious email attacks, this scalable solution also ensures that your confidential information remains unexploited through powerful policy configuration and compliance ...

    Download Now
  • Product Factsheet: Secure Email Gateway

    White Papers // Apr 2016 // provided by Singtel

    Secure Email Gateway (SEG) can secure your email infrastructure by stopping spam and viruses, allowing IT managers to focus on other strategic initiatives. This service eliminates the need to continuously train personnel and allocate budget for more hardware due to increasing number of threats. You can ensure the highest levels ...

    Download Now
  • MYOB Premier online

    White Papers // Apr 2016 // provided by Singtel

    Businesses are moving faster and employees need to use connected devices to work from anywhere, anytime—making traditional software cumbersome and limiting. In addition, successful businesses need flexibility to check and update their company’s accounting books on the go, which is why many of them are realising the benefits of cloud-based ...

    Download Now
  • Best Practices and Applications of TLS/SSL

    White Papers // Apr 2016 // provided by Symantec

    TLS (Transport Layer Security), widely known as SSL (Secure Sockets Layer), is the most well known method to secure your web site. But it can also be used for much more. Read the white paper, "Best Practices and Applications of TLS/SSL," to learn how TLS works, best practices for its ...

    Read more
  • Short Guide to Protecting Against Web Application Threats

    White Papers // Apr 2016 // provided by Symantec

    Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad—based mitigation to a number of threats. The use ...

    Read more
  • Mitigating Web Security Risk with SSL Certificates: Benefits and Best Practices, an IDC Technology Spotlight.

    White Papers // Apr 2016 // provided by Symantec

    Web-based systems are essential tools for running business processes and delivering services to customers. However, phishing and online fraud undermine customer confidence. In addition, Web security remains a top concern because of constantly evolving threats. Learn more about mitigating these web security risks with SSL Certificates in this IDC Technology ...

    Read more
  • Workforce mobility in a hypercompetitive world

    White Papers // Apr 2016 // provided by Telstra

    Hyper-competition has become a key feature of an increasingly global and digital economy. Enterprises in almost every industry are being disrupted, with many experiencing a significant impact on their legacy business. This is the result of a permanent shift in consumer behavior and consumption patterns brought on by the onslaught ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?