Techworld

Network Whitepapers


Sort by: Date | Company | Title


Leveraging Mobility to Improve Sales
By Oracle | 16/10/2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips, whether it is viewing information on potential clients, editing documents, taking notes and contact management. In this whitepaper, we look at the level of access needed by workers on the road, and how enterprises can deliver a more mobile, collaborative and data-rich business world. Click to download!
Download this now


Oracle ERP Cloud Service - Back-Office Solutions that Keep You in Front
By Oracle | 15/10/2013
Learn how you can harness the power of the cloud to run your business more effectively and lower upfront costs. Oracle ERP Cloud Service offers a comprehensive, enterprise-grade cloud that can transform back office operations and allow you to focus on running your business.
Download this now


Fraud in Insurance
By IBM | 26/9/2013
Cunningham Lindsey, a leading claims management company that specializes in fraud, not only uncovered an organized fraud ring but also established an efficient process for helping their insurance customers identify legitimate claims from the fraudulent ones. In this case study, find out how possible fraudulent claims were flagged, leading to the discovery of a criminal fraud.
Download this now


Defeating External and Internal Fraud
By IBM | 26/9/2013
The amount of money lost to fraud a year is staggering:globally, organisations lose 5% or $2.9 trillion in revenue annually. Today's fraud is committed on electronic networks at lightning speed by global rings of criminals, terrorists and insiders using sophisticated methods hidden in complex layers of transactional data. Download to find out how to empower analysts to search multiple data sources simultaneously to visualise transactions and timelines.
Download this now


Fraud Intelligence Analysis
By IBM | 26/9/2013
Fraud is significantly and evolving challenge for the financial industry, costing an estimated five to eight percent of revenues per annum. Companies had traditionally countered fraud with solutions that target known threats, however this 'rear-view-approach' can also fail to spot new and emerging attacks. In this whitepaper, we look at critical insights that aid in investigating complex incidents, whilst producing actionable visualisation. Click to download!
Download this now


Fighting Fraud with Big Data
By IBM | 26/9/2013
For industries with a full-time focus on fighting fraud, intelligence is invaluable. Whilst the annual cost of fraud is substantial and the benefits of reducing it are very real, we find that enterprises with proactive and predictive approaches to fighting fraud have a greater visibility and intelligence of possible fraud. Click to find out more.
Download this now


Carrier Class Product Assessment
By Alcatel-Lucent | 2/7/2013
One of the prevailing myths surrounding carrier class data centre solutions is that their implementation is either difficult to configure or create high maintenance costs. Network managers of telephony networks, due to high network demand, require resilience and simplicity in their design. In this whitepaper, we look at the strengths and weaknesses of competing enterprise data centre solution. Read now.
Download this now


NetApp FAS6240 Clustered SAN Champion of Champions
By NetApp | 17/4/2013
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.
Download this now


Bandwidth Bandits
By Symantec | 15/3/2013
Imagine if you gave up a quarter of your office space for non-work activities; it’s inconceivable. But when it comes to internet bandwidth, most companies loose the same proportion to employee web misuse, streaming media and spam. As a company’s internet is both costly and limited, click here to find out how best reduce bandwidth loss.
Download this now


Spear-Phishing Email: Most Favored APT Attack Bait
By Trend Micro | 30/11/2012
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Download this now

Twitter Feed

Featured Whitepapers