Security Whitepapers


Sort by: Date | Company | Title


McAfee Whitepaper: Building the Business Case for Privacy
By McAfee Australia | 9/5/2013
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
Download this now


New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (Sponsored by McAfee)
By McAfee Australia | 18/3/2013
The latest version of the flagship McAfee® Gateway Anti-Malware technology adapts to new threats and plans for future threats with a modular design that allows for the easy addition of components for maximum flexibility for future malicious exploit trends.
Download this now


Modernizing Security for the Small and Mid-Sized Business – Recommendations for 2013 (Sponsored by McAfee)
By McAfee Australia | 18/3/2013
As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Specifically, email security, web security and secure file sharing should be considered foundational security capabilities for every small and mid-sized business, in addition to anti-virus and firewalls.
Download this now


Stop Password Sprawl with SaaS Single Sign-On via Active Directory
By Centrify | 10/12/2012
This whitepaper addresses how to deal with the cost and complexity of managing additional identity silos during the adoption of new SaaS, including integration costs, increased help desk load and lower productivity as users struggle with multiple passwords, password policies and frustrating login interfaces for browsers and client applications on mobile devices.
Download this now


A Practical Path to Unified Identity Across Data Center, Cloud and Mobile
By Centrify | 10/12/2012
This whitepaper looks at the major trends challenging IT organizations today and the increasing heterogeneity and hybridization of platforms inside and outside the organization, the rush to deploy SaaS applications and the explosion in smart phone and tablet devices users are bringing to work to for personal productivity.
Download this now


IDG Strategy Guide: Privileged Identity Management Guide
By Centrify | 15/10/2012
This strategy guide outlines the key criteria for implementing a secure and effective privileged identity system and avoiding the most common pitfalls.
Download this now


IDG Strategy Guide: Identity and Access Management Guide
By Centrify | 12/10/2012
This whitepaper details the importance to business of having a cohesive and centralised identity and access management system.
Download this now
 

Latest News

Oct 31
Over a quarter of Australians won’t bank on their mobile: Kaspersky
Oct 31
HDS A/NZ Partner Summit 2014 in Noosa (+15 photos)
Oct 31
The Google shakeup continues: Andy Rubin is out
Oct 31
Impact Systems boss wants to buy 10 resellers
More News
05 Nov
LIVE Webcast: Lessons Learned from the Biggest Security Breaches
05 Nov
vForum 2014
10 Nov
Ascom Myco Launch Event
11 Nov
DCIM Certified Solutions Professional
View all events