Techworld

Security Whitepapers


Sort by: Date | Company | Title


Symantec Business Data Protection Kit
By Symantec | 24/10/2014
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
Download this now


Symantec 2014 Internet Security Threat Report
By Symantec | 14/10/2014
The 2014 Internet Security Threat Report highlights the developments in cyber-crime in the last year and provides an analysis in global threat activity. Highlights from the report are: • Hackers continuing to attack PCs, as well as mobile devices, security cameras, routers and more • The number of data breaches has risen 62% from 2013, identity breaches up 493% • Ransomware attacks rose 500% and have evolved into more vicious assaults
Download this now


14 Tips for your Data Protection Plan
By Symantec | 14/10/2014
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
Download this now


Infographic: Phishing. Who’s being targeted?
By Symantec | 14/10/2014
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
Download this now


Data centre strategies for business growth in a hybrid cloud world
By Pacnet Australia | 14/10/2014
The data centre is now a strategic part of the hybrid cloud mix. This whitepaper discusses what you should know about the future of data centre and how to position your organisation for agility and growth. • Australia’s data centre market grew 17.2% to over $700 million in the last year. • Data centre engagement is often seen just as a commercial relationship, not a business relationship. • The 5 most important points CIOs need to consider before choosing a data centre
Download this now


Continous application availability with EMC VPLEX
By EMC Corporation | 8/9/2014
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
Download this now


EMC Asia Pacific and Japan- The business value of data protection
By EMC Corporation | 8/9/2014
This infographic based on research by IDC details how businesses in Australia, Pacific and Japan can come out on top against tremendous pressure to reduce capital expenses, while maximising existing investments and improving utilisation and efficiency. • APJ businesses suffer longer retention periods, increased scrutiny of stored data and the need for greater leverage, storage and protection • 81% companies lack recovery confidence, while 71% have experienced data loss in last year • Overarching storage management services add value and the oversight the business needs, with average cost savings of US$2.6 million annually
Download this now


EMC Best practices in data protection monitoring
By EMC Corporation | 8/9/2014
This ESG study focuses on why, when it comes to data protection, visibility is the most significant key to success, and how to achieve a truly unified view. · According to the 2013 IT Spending Intentions Survey, improving data backup and recovery was the #2 most important IT priority selected by respondents · Without far reaching visibility, infrastructure is guaranteed to miss backing up some servers, while potentially duplicating protection of others · The clarity gained by a unified view is necessary for proactively reporting protection to stakeholders and compliance to auditors
Download this now


Transforming mobility management through a unified approach
By Dell | 5/9/2014
These days IT teams must support a multiplicity of devices, operating systems and work habits. This paper helps readers learn how best to simplify administration and secure vital data. • To capitalize on mobility, enterprises need to provide employees with access to corporate data and applications anytime, anywhere • Organizations need to expand access to corporate networks without exposing the organization to threats • Organizations must have the flexibility to accommodate a wide range of variables today and lay the groundwork for future developments
Download this now


Mobility: Going your way
By Dell | 5/9/2014
Constant connectivity is causing a shift in worker expectations. This whitepaper demonstrates how an effective mobility strategy empowers users and improves business performance without compromising essential IT controls. • Employees and business leaders expect constant connectivity, diverse collaboration tools and on-demand access to enterprise applications • If user expectations don’t align with business requirements, decision makers must find a common ground • By adopting a comprehensive, integrated solution, organizations can quickly and flexibly add new capabilities
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers