Enterprise Whitepapers


Sort by: Date | Company | Title


Detecting a Phising Email
By LogRhythm | 19/4/2016

It is critical to take proactive measures to protect yourself and your organisation’s security. Being vigilant and educating staff on the potential dangers of phising emails is a critical step in protection. This infographic illustrates the 10 things you need to know spot and handle phising email.

Download this now


Anatomy of a Hack Disrupted
By LogRhythm | 19/4/2016

With malware threats growing larger and more challenging to cope with each year, organisations can no longer rely on signature-based scanning of machines to identify these threats. Find out in this whitepaper how a comprehensive approach can ensure threats are automatically detected, isolated, identified, and disrupted well before any damage can be done.

Download this now


Responding to Today’s Advanced Threats
By LogRhythm | 19/4/2016

True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. Find out in this product review how you can get visibility to detect threats to the organization and responding to them in a timely fashion.

Download this now


Leveraging micro-segmentation to build a zero trust network
By VMware Australia | 29/1/2016

This whitepaper looks at the security gaps and disconnects in organisations, how network virtualisation can help to reduce risk and support a higher-level security strategy and why micro-segmentation provided through network virtualisation paves the way for implementing a Zero Trust model.

Download this now


A brief history of Apache Hadoop
By Cloudera | 27/1/2016

This infographic looks at how hadoop has evolved over time to now have more than 1.7 million lines of code in core and more than 12,000 plus commits to core since 2006.

Download this now


Big Data use cases for telcos
By Cloudera | 27/1/2016

Telecom Service Providers are now able to turn the avalanche of data they have into valuable business insights. These insights play an integral role to help telcos achieve business objectives and promote growth. This whitepaper looks at the 4 key big case data uses for telcos from customer experience management, to network optimisation, operational analytics and data monetisation.

Download this now


Big Data analytics for product performance intelligence helps manufacturers save millions
By Cloudera | 27/1/2016

Supply chain quality has been the holy grail of manufacturing as issues in this area would impact the customer's experience and create negative repercussions for a company's bottom line. Find out how the enterprise data hub helped an organisation save $15-25 million based on its ability to identify and address supply chain issues in near real time.

Download this now


Choosing the right virtualisation platform to suit your business needs
By VMware Australia | 20/1/2016

With the footprint of virtualisation expanding across organisations, it is crucial to choose a reliable platform which will allow companies to improve business agility while avoiding disruption. Find out in this whitepaper how choosing the right virtualisation platform can help companies to reduce 53% of infrastructure management cost while receiving 2.4 times return on investment.

Download this now


The future of work: Reshaping the workplace today. Building for tomorrow.
By Citrix | 19/1/2016

This research report looks at the future of the workplace, and how employee productivity and business profitability will be impacted. Focusing on the special challenges relevant to businesses with fewer than 100 employees, this whitepaper examines how to manage employees that want to work from home, the use of BYOD computers and tablets, and methods for extracting real world productivity and value from your teams.

Download this now


Connect and protect: Building a trust-based Internet of Things for business-critical applications
By Aruba Wireless Networks | 18/1/2016

As IoT has grown in size and complexity, mechanisms to ensure security haven't kept pace and is often managed with an operation focus.Find out how organisations can bring order and trust to unsecured devices that make up IoT and how exploiting IoT data can be executed without incurring risk.

Download this now

Market Place

[]