Risk management Whitepapers


Sort by: Date | Company | Title


Reduce insurance fraud and dramatically improve time to access claim data
By Cloudera | 27/1/2016

With fraud costing the property and casualty industry $30 billion each year in the US alone, reducing fraud opportunities will contribute to a company's bottom line immediately and reduce risk exposure. Find out in this case study how a company is able to have real time access to 60 plus years of adjuster claim notes data and how they were able to enhance their warehouse environment.

Download this now


Leveraging real-time context to mitigate today's new risk
By Aruba Wireless Networks | 14/12/2015

With BYOD initiatives a norm today, organisations are struggling to secure data and mitigate new risks associated with mobility. This whitepaper offers insights on how companies can dramatically simplify their access infrastructure while improving security and lowering the provisioning burden on IT.

Download this now


Securing the rising mobile generation: Is your business running the risk?
By Aruba Wireless Networks | 14/12/2015

The rise of the mobile generation has brought about a collaborative presence in the workforce. In the culture of sharing and openness, companies need to ensure enterprise assets do not suffer as a result. Research shows 4 in 10 finance companies have lost critical data through misuse of a mobile device. Find out in this whitepaper how organisations can develop a "mobile aware" culture within the workforce to lower this risk.

Download this now


Top 10 Tips for Cyber Resilience
By Symantec | 22/5/2014

Presented in the form of the top 10 tips for cyber resilience, this whitepaper provides a simple, easy to digest guide for enterprise on how best to secure your business against cyber risk and threats.

Download this now


A Manifesto for Cyber Resilience
By Symantec | 22/5/2014

With the growing transition to a more online existence, users need to be more conscious about leading and protecting our online identity. This Manifesto sets out a plan to reduce the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM Australia | 20/3/2014

Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.

Download this now


Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
By Tenable Network Security | 10/3/2014

This report assesses the current state and effectiveness of vulnerability management.

Download this now


eBook: Five Mobile Collaboration Threats Facing All Enterprises
By Good Technology | 13/2/2014

Security and convenience should not be a zero-sum game. Security must not block progress to transform businesses. Likewise, mobile collaboration presents a tremendous opportunity for businesses. Read this paper to understand the five primary threats and how to both address risks and gain process efficiencies through secure mobility.

Download this now


50 Questions When Considering The Cloud
By Lyris Technologies | 30/1/2014

When considering whether or not to move to the cloud, there’s many questions you need to consider, and it’s unlikely that any single vendor will provide all the answers. This whitepaper provides your organisation a detailed list of security considerations to discuss both internally and with transparent vendors. Finding the right answers will help you develop a proper risk assessment and make informed decisions about cloud computing in your business.

Download this now


The Application Usage and Threat
By Palo Alto Networks | 14/11/2013

This whitepaper provides provides a global view into enterprise application usage and the associated threats by summarizing network traffic assessments conducted in 3,056 organizations worldwide in 2012. The application and threat patterns discussed within this report dispel the position that social networking, filesharing and video applications are the most common threat vectors, while reaffirming that internal applications are highly prized targets.

Download this now
[]