Techworld

Whitepapers


Sort by: Date | Company | Title


Gartner Magic Quadrant for Global MSSPs
By IBM Australia | 30/1/2015
Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements.
Download this now


IDC MarketScape Excerpt: Worldwide Managed Security Services 2014 Vendor Assessment
By IBM Australia | 30/1/2015
This IDC study represents a vendor assessment of providers offering managed security services (MSS) through the IDC MarketScape model. The assessment reviews both quantitative and qualitative characteristics that define current market demands and expected buyer needs for MSS. The evaluation is based on a comprehensive and rigorous framework that assesses how each vendor stacks up to one another, and the framework highlights the key factors that are expected to be the most significant for achieving success in the MSS market over the short term and the long term.
Download this now


Citrix helps Future Group realise faster time to market, better security
By Citrix Systems Asia Pacific | 12/1/2015
Future Group, a major player in India’s retail sector, was looking to be more competitive wish faster time to market and better security. This case study outlines: •How they achieved solid security in the complex management of a huge number of desktops •Which benefits they received, the hardware and storage used as well as the applications delivered •Gave back control to the company, reducing IT costs and maximising end-user experience for all
Download this now


Are you doing all you can to protect your critical information?
By Citrix Systems Asia Pacific | 12/1/2015
This infographic looks at the challenge of both empowering your workforce with constant access on all devices and protecting your critical business information. •Understand why attacks on information are multifaceted and how to create a security approach to address this •Learn the 7 best practice principles to protect your critical business information •See why security technologies are critical for protection and how to implement for best use
Download this now


Vision Australia VDI case study
By Citrix Systems Asia Pacific | 12/1/2015
This case study explains the goals and achievements behind Vision Australia’s adoption of virtual desktop infrastructure (VDI) and provides advice for similar workplace strategies •Adopting VDI has improved employee productivity and also saved costs in avoiding a capital outlay in refreshing end-user devices •VDI implementation means that employees can now BYOD, while the IT department can retain control •Implementation has seen improved performance in all objectives, the most obvious being in cost management and productivity.
Download this now


Fulton Hogan case study
By Citrix Systems Asia Pacific | 12/1/2015
This case study looks at the results of civil contracting company, Fulton Hogan, was able to achieve after adopting a suite of technologies to support its end-user computing environment. •Company was looking for new technology that would give better project support, secure access and to increase mobile usage •Growth was seen in all goal areas of: growth, cost management, risk management, talent management, client engagement, CSR, productivity and innovation •Dynamic infrastructure allows the IT department to adapt quicker and support the business’s needs, across multiple areas
Download this now


A day in the life of John Holland
By Citrix Systems Asia Pacific | 12/1/2015
This whitepaper looks into one of Australia’s largest engineering, contracting and service organisations and why they have chosen to adopt VDI, their goals and achievements since implementation. •Provides advice to technology leaders considering their own workplace strategy and/or evaluating VDI •Major benefits found in cost management through the centralisation of infrastructure •Productivity and employee engagement increased through more efficient mobilisation of over 20 processes
Download this now


A day in the life of John Holland
By Citrix Systems Asia Pacific | 12/1/2015
This whitepaper looks into one of Australia’s largest engineering, contracting and service organisations and why they have chosen to adopt VDI, their goals and achievements since implementation. •Provides advice to technology leaders considering their own workplace strategy and/or evaluating VDI •Major benefits found in cost management through the centralisation of infrastructure •Productivity and employee engagement increased through more efficient mobilisation of over 20 processes
Download this now


Application Usage and Threat Report
By Palo Alto Networks | 5/1/2015
The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014. This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.
Download this now


A Spotlight on Malware Attack Vectors in Key Industries
By Palo Alto Networks | 5/1/2015
This edition of the recurring Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware. Download the latest research from Unit 42 to see current trends and malware distribution patterns across 10 industries, and find out what you need to know about the Kuluoz malware family, and how to defend against it.
Download this now

Twitter Feed

Featured Whitepapers