Security Whitepapers


Sort by: Date | Company | Title


Top 5 Steps to Reduce File Data Leakage Risks
By FinalCode | 26/9/2016

Given the necessity of file sharing, respective risks and obligations, and available file protection mechanisms, what is a pragmatic approach for organizations to reduce IP loss, privacy compliance liability and business exposure due to sensitive file data leakage. Here are the top 5 steps that your organization can put in place today.

Download this now


On the Radar: FinalCode addresses persistent file security challenges for the enterprise
By FinalCode | 26/9/2016

Maintaining control over cloud access, collaborative applications, and user mobility are three of the major challenges to protecting data and files that enterprise IT departments face.

Alongside the task of maintaining appropriate enterprise network resource access, organizations need file protection products that offer appropriate levels of control for the internal users and the variety of external users requiring access to sensitive and/or regulated information. Satisfying these challenges is necessary to protect the intellectual property of the business and its market position, and to manage the reputation and liability risks associated with privacy and compliance.

Download this now


EMA Survey Report
By FinalCode | 26/9/2016

File Insecurity: The Final Data Leakage Frontier

Download this now


Infographic: INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY
By Dell Secureworks | 12/9/2016

It may have taken years, but greater executive involvement in IT security strategy is putting real weight behind the transformation that is seeing Australian businesses revisit their security practices and the escalation of authority behind crucial security initiatives. The CSO-Dell Secureworks IT Security Strategy Survey 2016 highlighted the extent of this transformational trend, with an almost even split between the number of companies where security executives report to the CIO and those that report to other business executives.

Download this now


INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY: TOP TIPS
By Dell Secureworks | 12/9/2016

INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY: TOP TIPS

Download this now


INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY
By Dell Secureworks | 12/9/2016

T here is nothing new about arguments that information security should be recognised as a high-level concern – and handled at the highest levels of the organisation. However, according to the recent CSO-Dell Secureworks IT Security Strategy Survey 2016, Australian businesses are making great strides towards making this happen.

Download this now


Infographic: Advanced Security from the Inside with VMware NSX
By VMware Australia | 29/6/2016

Okay, you've secured the perimeter of your Data Centre.

But what about those threats that infiltrate, lie dormant and then attack your critical systems from within?

Now, with micro-segmentation, you can implement fine-grained policies and network controls within each of your Data Centre components. It's an incredibly flexible and scalable approach.

And thanks to VMware NSX®, you can achieve this with your existing infrastructure, applications and security products.

Download this now


How to proactively manage cyber security threats
By Stickman Consulting | 27/6/2016

The consequences of a cyber-attack can be devastating, such as loss of customer confidence, ruined reputation and costly legal ramifications. Not to mention the potential destruction of your entire business. To be fully effective, cyber security must be proactively managed and owned at board level. Not not just by the IT department. It needs to be broad in scope, and senior management needs to recognise that it’s a whole of business challenge.

Download this now


10 Reasons to Strengthen Security with App and Desktop Virtualization
By Citrix | 25/5/2016

Regain control and reduce risk without sacrificing business productivity and growth.

By using virtualization, organisations can pursue top priorities such as mobility, flexwork and consumerization while effectively managing risk, securing information, supporting global compliance and strengthening business continuity planning.

Download this now


SECURITY, DURABILITY AND USABILITY TARGET HP’S FLAGSHIP CONVERTIBLE AT BUSINESS USERS
By HP | 26/4/2016

Computer vendors have carefully straddled the line between laptop and tablet, distributing features in both directionsas end-user demand transitions from one form factor to the other. Recent consolidation around convertible devices, which combine both form factors into a single coherent unit, has turbocharged the tablet into a productivity tool that is gaining currency amongst business users whose primary needs include productivity tools and access to cloud services.

Download this now

Market Place

[]