Security Whitepapers


Sort by: Date | Company | Title


Detecting a Phising Email
By LogRhythm | 19/4/2016

It is critical to take proactive measures to protect yourself and your organisation’s security. Being vigilant and educating staff on the potential dangers of phising emails is a critical step in protection. This infographic illustrates the 10 things you need to know spot and handle phising email.

Download this now


Anatomy of a Hack Disrupted
By LogRhythm | 19/4/2016

With malware threats growing larger and more challenging to cope with each year, organisations can no longer rely on signature-based scanning of machines to identify these threats. Find out in this whitepaper how a comprehensive approach can ensure threats are automatically detected, isolated, identified, and disrupted well before any damage can be done.

Download this now


Responding to Today’s Advanced Threats
By LogRhythm | 19/4/2016

True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. Find out in this product review how you can get visibility to detect threats to the organization and responding to them in a timely fashion.

Download this now


Breaking the Kill Chain - Stopping Data Breaches
By CA Pacific | 2/3/2016

This paper examines a somewhat simplified version of the insider threat kill chain and provides concrete examples and use cases of how privileged access management can help stop attacks and breaches.

Download this now


Solution Brief: CA Privilege Identity Manager
By CA Pacific | 2/3/2016

Learn how you can minimise the risk of internal threats by managing shared account passwords, report on user activities and establish fine-grained segregation of duties across the enterprise.

Download this now


Forrester Wave Report for Privileged Identity Management
By CA Pacific | 2/3/2016

This detailed report provides a thorough evaluation of all the vendors offering Privileged Management solutions. CA is named as the only leader in this report.

Download this now


Security Executive Brief: Best Practices and a Maturity Model for Securing Privileged Identities
By CA Pacific | 2/3/2016

This guide provides 22 specific actions that you can take to more effectively control privileged user accounts and access across your organisation in the context of a maturity model.

Download this now


eBook: Defending Against Insider Threats in the “Snowden Era”
By CA Pacific | 2/3/2016

Insider threats and data breaches are becoming more and more common and the stakes have never been higher. This ebook details the strategies and best practices for defending against insider threats that can lead to significant data breaches.

Download this now


Clientless Remote Support Software: A Key Service Desk Tool to Drive User Satisfaction and Productivity
By LogMeIn | 23/2/2016

IDC spent time with two customers of clientless remote software, Dell and Dover Federal credit Union, and they spoke about the importance of security, feature sets and the strong relationships needed to successfully deploy and manage tool sets that support end-users in a holistic manner. IDC shows how Mobility and IoT (Internet of things) will continue to drive growth and innovation across all industries that depend on IT resources.

Download this now


Security Analytics: The Cornerstone Of Modern Detection And Response
By RSA | 5/2/2016

Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. Given the proliferation and sophistication of malicious entities, organizations must assume that they will be infiltrated and have an effective detection and response strategy. In this report Forrester Consulting evaluates how the capabilities of SIEM and security analytics solutions stack up against the current threat landscape.

Download this now

Market Place

[]