Techworld

White Papers: network


Sort by: Date | Company | Title


Defeating External and Internal Fraud
By IBM | 26/9/2013
The amount of money lost to fraud a year is staggering:globally, organisations lose 5% or $2.9 trillion in revenue annually. Today's fraud is committed on electronic networks at lightning speed by global rings of criminals, terrorists and insiders using sophisticated methods hidden in complex layers of transactional data. Download to find out how to empower analysts to search multiple data sources simultaneously to visualise transactions and timelines.
Download this now


Fraud Intelligence Analysis
By IBM | 26/9/2013
Fraud is significantly and evolving challenge for the financial industry, costing an estimated five to eight percent of revenues per annum. Companies had traditionally countered fraud with solutions that target known threats, however this 'rear-view-approach' can also fail to spot new and emerging attacks. In this whitepaper, we look at critical insights that aid in investigating complex incidents, whilst producing actionable visualisation. Click to download!
Download this now


Fighting Fraud with Big Data
By IBM | 26/9/2013
For industries with a full-time focus on fighting fraud, intelligence is invaluable. Whilst the annual cost of fraud is substantial and the benefits of reducing it are very real, we find that enterprises with proactive and predictive approaches to fighting fraud have a greater visibility and intelligence of possible fraud. Click to find out more.
Download this now


Carrier Class Product Assessment
By Alcatel-Lucent | 2/7/2013
One of the prevailing myths surrounding carrier class data centre solutions is that their implementation is either difficult to configure or create high maintenance costs. Network managers of telephony networks, due to high network demand, require resilience and simplicity in their design. In this whitepaper, we look at the strengths and weaknesses of competing enterprise data centre solution. Read now.
Download this now


NetApp FAS6240 Clustered SAN Champion of Champions
By NetApp | 17/4/2013
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.
Download this now


Bandwidth Bandits
By Symantec | 15/3/2013
Imagine if you gave up a quarter of your office space for non-work activities; it’s inconceivable. But when it comes to internet bandwidth, most companies loose the same proportion to employee web misuse, streaming media and spam. As a company’s internet is both costly and limited, click here to find out how best reduce bandwidth loss.
Download this now


Spear-Phishing Email: Most Favored APT Attack Bait
By Trend Micro | 30/11/2012
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Download this now


Detecting APT Activity with Network Traffic Analysis
By Trend Micro | 13/11/2012
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Download this now


Ryerson University Case Study
By Exinda | 18/10/2012
A key priority for Ryerson is to provide consistent access to network applications, which range from a public-facing web site to critical applications such as student registration and learning management. With students, faculty, and staff all vying for the same resources on the network (including as many as 5000 wireless users at any given time), Ryerson needed a way to provide a predictable user experience. Read more.
Download this now


MLB Network Case Study
By Exinda | 18/10/2012
From 2009 through early 2011 MLB Network connected to the outside world through dual 45-megabit DS3 circuits, but with as many as 1000 users during the baseball season transferring everything from video files to player statistics, the network had reached saturation. “We were seeing 98% utilisation on our routers then, and wanted to ensure we were prepared for the MLB First-Year Player Draft in June,” said MLB Network IT director Cindy Cortell. Read more.
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers