Security Whitepapers


Sort by: Date | Company | Title


With honeypots and threat intelligence ecosystems, LogRhythm expands capabilities
By LogRhythm | 16/6/2015
Security information and event management (SIEM) products provide a plethora of data that can be enriched to the nth degree. However, this data is of little value unless it can be converted into meaningful information that organizations can use to proactively detect and respond to threats in an acceptable timeframe.
Download this now


Are you getting the most from your hybrid IT environment?
By IBM Australia | 15/6/2015
This infographic looks at how to organisations are overcoming the challenges associated with hybrid computing and summarizes the results found in the research paper “Optimized Sourcing in Hybrid Environments.”
Download this now


New technology adoption is pushing enterprise networks to the breaking point
By IBM Australia | 15/6/2015
This infographic looks at pressures on enterprise networks as demand and deployment rates for cloud, big data and analytics, mobile, social as IT security capabilities sky-rocket.
Download this now


Cyber Security Guide - 10 Steps to a More Secure Business
By Check Point Software Technologies | 9/3/2015
Just as we’ve learned to tune out car alarms, so have we become impervious to the headlines of cybercrime. That’s despite cybercriminals stealing over 500 million identities1 in 2014, alone. According to a December 2014 Computer Weekly article2, “The production of malware continues on an industrial scale, with exploit kits and malware services putting sophisticated attack methods in the hands of relatively unskilled cyber criminals.” And unfortunately, ignoring the issue will not make it go away.
Download this now


Citrix helps Future Group realise faster time to market, better security
By Citrix Systems Asia Pacific | 12/1/2015
Future Group, a major player in India’s retail sector, was looking to be more competitive wish faster time to market and better security. This case study outlines: •How they achieved solid security in the complex management of a huge number of desktops •Which benefits they received, the hardware and storage used as well as the applications delivered •Gave back control to the company, reducing IT costs and maximising end-user experience for all
Download this now


Are you doing all you can to protect your critical information?
By Citrix Systems Asia Pacific | 12/1/2015
This infographic looks at the challenge of both empowering your workforce with constant access on all devices and protecting your critical business information. •Understand why attacks on information are multifaceted and how to create a security approach to address this •Learn the 7 best practice principles to protect your critical business information •See why security technologies are critical for protection and how to implement for best use
Download this now


Application Usage and Threat Report
By Palo Alto Networks | 5/1/2015
The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014. This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.
Download this now


A Spotlight on Malware Attack Vectors in Key Industries
By Palo Alto Networks | 5/1/2015
This edition of the recurring Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware. Download the latest research from Unit 42 to see current trends and malware distribution patterns across 10 industries, and find out what you need to know about the Kuluoz malware family, and how to defend against it.
Download this now


Network boundaries have gone mobile
By Check Point Software Technologies | 15/12/2014
Today’s employees carry smartphones, tablets and laptops and rarely think twice about using their personal devices for work or work devices for personal activities. The mobile workforce will surpass 1.3 billion people, or 37% of the world’s overall workforce, by 2015 according to IDC.1
Download this now

Top Whitepapers

Featured Whitepapers