Techworld

Security Whitepapers


Sort by: Date | Company | Title


Symantec. 2014 Internet Security Threat Report
By Symantec | 14/10/2014
The 2014 Internet Security Threat Report highlights the developments in cyber-crime in the last year and provides an analysis in global threat activity. Highlights from the report are: • Hackers continuing to attack PCs, as well as mobile devices, security cameras, routers and more • The number of data breaches has risen 62% from 2013, identity breaches up 493% • Ransomware attacks rose 500% and have evolved into more vicious assaults
Download this now


Symantec. Enterprise Vault.cloud®
By Symantec | 14/10/2014
Email has become one of the most critical information assets in a company. This datasheet gives insight to the importance of protecting your email and how you should approach putting a plan in place. Find out: • Why search capabilities are one of the most important factors in email storage management • The four requirements your email management system must have to be disaster proof • How cloud based email programs benefit organisations in accessibility and cost
Download this now


14 Tips for your Data Protection Plan
By Symantec | 14/10/2014
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
Download this now


Symantec. Email Security.cloud®
By Symantec | 14/10/2014
Email is more than just a messaging platform; it’s also holds all your business’ critical information and can be a gateway for scams, viruses and malware. This datasheet covers the importance of managing email threats. • Why you need to be the gate-keeper of the email content entering and leaving your organisation • The importance of blocking malicious and inappropriate content before it reaches your network • How you can reduce risk and reduce cost in managing your email security
Download this now


Symantec. Web Security.cloud®
By Symantec | 14/10/2014
Businesses have to adopt web usage policies to maximise productivity, limit data loss and minimise legal risks. This datasheet outlines how and why new approaches should be simplified for greater effectiveness. • Attackers are primarily using websites to deliver viruses and spyware, new approaches are needed • Why you need a modern integrated management tool to protect all your web based applications • How mutli-layer security and url filtering contributes to maximum safety
Download this now


Infographic: Phishing. Who’s being targeted?
By Symantec | 14/10/2014
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
Download this now


Data centre strategies for business growth in a hybrid cloud world
By Pacnet Australia | 14/10/2014
The data centre is now a strategic part of the hybrid cloud mix. This whitepaper discusses what you should know about the future of data centre and how to position your organisation for agility and growth. • Australia’s data centre market grew 17.2% to over $700 million in the last year. • Data centre engagement is often seen just as a commercial relationship, not a business relationship. • The 5 most important points CIOs need to consider before choosing a data centre
Download this now


Continous application availability with EMC VPLEX
By EMC Corporation | 8/9/2014
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
Download this now


EMC Asia Pacific and Japan- The business value of data protection
By EMC Corporation | 8/9/2014
This infographic based on research by IDC details how businesses in Australia, Pacific and Japan can come out on top against tremendous pressure to reduce capital expenses, while maximising existing investments and improving utilisation and efficiency. • APJ businesses suffer longer retention periods, increased scrutiny of stored data and the need for greater leverage, storage and protection • 81% companies lack recovery confidence, while 71% have experienced data loss in last year • Overarching storage management services add value and the oversight the business needs, with average cost savings of US$2.6 million annually
Download this now


EMC Best practices in data protection monitoring
By EMC Corporation | 8/9/2014
This ESG study focuses on why, when it comes to data protection, visibility is the most significant key to success, and how to achieve a truly unified view. · According to the 2013 IT Spending Intentions Survey, improving data backup and recovery was the #2 most important IT priority selected by respondents · Without far reaching visibility, infrastructure is guaranteed to miss backing up some servers, while potentially duplicating protection of others · The clarity gained by a unified view is necessary for proactively reporting protection to stakeholders and compliance to auditors
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers