Security Whitepapers


Sort by: Date | Company | Title


McAfee Whitepaper: Building the Business Case for Privacy
By McAfee Australia | 9/5/2013
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
Download this now


New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (Sponsored by McAfee)
By McAfee Australia | 18/3/2013
The latest version of the flagship McAfee® Gateway Anti-Malware technology adapts to new threats and plans for future threats with a modular design that allows for the easy addition of components for maximum flexibility for future malicious exploit trends.
Download this now


Modernizing Security for the Small and Mid-Sized Business – Recommendations for 2013 (Sponsored by McAfee)
By McAfee Australia | 18/3/2013
As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Specifically, email security, web security and secure file sharing should be considered foundational security capabilities for every small and mid-sized business, in addition to anti-virus and firewalls.
Download this now


Stop Password Sprawl with SaaS Single Sign-On via Active Directory
By Centrify | 10/12/2012
This whitepaper addresses how to deal with the cost and complexity of managing additional identity silos during the adoption of new SaaS, including integration costs, increased help desk load and lower productivity as users struggle with multiple passwords, password policies and frustrating login interfaces for browsers and client applications on mobile devices.
Download this now


A Practical Path to Unified Identity Across Data Center, Cloud and Mobile
By Centrify | 10/12/2012
This whitepaper looks at the major trends challenging IT organizations today and the increasing heterogeneity and hybridization of platforms inside and outside the organization, the rush to deploy SaaS applications and the explosion in smart phone and tablet devices users are bringing to work to for personal productivity.
Download this now


IDG Strategy Guide: Privileged Identity Management Guide
By Centrify | 15/10/2012
This strategy guide outlines the key criteria for implementing a secure and effective privileged identity system and avoiding the most common pitfalls.
Download this now


IDG Strategy Guide: Identity and Access Management Guide
By Centrify | 12/10/2012
This whitepaper details the importance to business of having a cohesive and centralised identity and access management system.
Download this now
 

Latest News

07:50AM
Hands-on with Microsoft's new Windows 10: UI changes that look great at first bl...
07:10AM
Top Twitter reactions to Windows 10
05:22AM
Attention enthusiasts: Windows 10 Technical Preview landing Wednesday
05:02AM
Windows 10: a new platform that runs on every device
More News
07 Oct
DC Infrastructure Solutions Professional
08 Oct
DCIM Certified Solutions Professional
15 Oct
Dell User Forum
21 Oct
NewLease & Red Hat Breakfast Briefing (Melbourne)
View all events