Security Whitepapers


Sort by: Date | Company | Title


10 Reasons to Strengthen Security with App and Desktop Virtualization
By Citrix | 25/5/2016

Regain control and reduce risk without sacrificing business productivity and growth.

By using virtualization, organisations can pursue top priorities such as mobility, flexwork and consumerization while effectively managing risk, securing information, supporting global compliance and strengthening business continuity planning.

Download this now


SECURITY, DURABILITY AND USABILITY TARGET HP’S FLAGSHIP CONVERTIBLE AT BUSINESS USERS
By HP | 26/4/2016

Computer vendors have carefully straddled the line between laptop and tablet, distributing features in both directionsas end-user demand transitions from one form factor to the other. Recent consolidation around convertible devices, which combine both form factors into a single coherent unit, has turbocharged the tablet into a productivity tool that is gaining currency amongst business users whose primary needs include productivity tools and access to cloud services.

Download this now


Breaking the Kill Chain - Stopping Data Breaches
By CA Pacific | 2/3/2016

This paper examines a somewhat simplified version of the insider threat kill chain and provides concrete examples and use cases of how privileged access management can help stop attacks and breaches.

Download this now


Solution Brief: CA Privilege Identity Manager
By CA Pacific | 2/3/2016

Learn how you can minimise the risk of internal threats by managing shared account passwords, report on user activities and establish fine-grained segregation of duties across the enterprise.

Download this now


Forrester Wave Report for Privileged Identity Management
By CA Pacific | 2/3/2016

This detailed report provides a thorough evaluation of all the vendors offering Privileged Management solutions. CA is named as the only leader in this report.

Download this now


Security Executive Brief: Best Practices and a Maturity Model for Securing Privileged Identities
By CA Pacific | 2/3/2016

This guide provides 22 specific actions that you can take to more effectively control privileged user accounts and access across your organisation in the context of a maturity model.

Download this now


eBook: Defending Against Insider Threats in the “Snowden Era”
By CA Pacific | 2/3/2016

Insider threats and data breaches are becoming more and more common and the stakes have never been higher. This ebook details the strategies and best practices for defending against insider threats that can lead to significant data breaches.

Download this now


Clientless Remote Support Software: A Key Service Desk Tool to Drive User Satisfaction and Productivity
By LogMeIn | 23/2/2016

IDC spent time with two customers of clientless remote software, Dell and Dover Federal credit Union, and they spoke about the importance of security, feature sets and the strong relationships needed to successfully deploy and manage tool sets that support end-users in a holistic manner. IDC shows how Mobility and IoT (Internet of things) will continue to drive growth and innovation across all industries that depend on IT resources.

Download this now


Security Analytics: The Cornerstone Of Modern Detection And Response
By RSA | 5/2/2016

Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. Given the proliferation and sophistication of malicious entities, organizations must assume that they will be infiltrated and have an effective detection and response strategy. In this report Forrester Consulting evaluates how the capabilities of SIEM and security analytics solutions stack up against the current threat landscape.

Download this now


Vendors Enhance Threat Mitigation And Cloud Capabilities
By CA Pacific | 3/2/2016

Forrester Wave Report for Privileged Identity Management provides a thorough evaluation of all the vendors offering Privileged Management solutions. Today’s economic environment is forcing S&R professionals to consider alternatives to on-premises solutions and use cloud services. Leaders in the PIM space now offer cloud support, threat mitigation to prevent data breaches, and privileged identity intelligence.

Download this now

Market Place

[]