Security Whitepapers


Sort by: Date | Company | Title


D-Link Case Study: TAFE Improves Security with a Powerful HD Surveillance Solution
By D-Link Australia | 28/6/2016

By employing the use of D-Link’s Full HD IP cameras connected to secured sections of the TAFE’s data network, the new solution provided far better surveillance coverage, clearer images and integrated seamlessly with the TAFE’s existing infrastructure.

Download this now


The LOGICnow Cyber Threat Guide
By LogicNow | 18/3/2016

Nine types of internet threats and how to stop them. Defending networks from attacks is no easy task for IT professionals. Attacks range in capability and threat; and over reacting or implementing the wrong technology can be costly and make it easier for the bad guys.

Download this now


Discover how to increase margins through a layered approach to effective cyberdefence.
By LogicNow | 18/1/2016

Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related responses. Understanding that effective cyberdefence involves multiple layers of technology is a key takeaway, as is the understanding that customer disruption is a revenue killer in world of the managed service provider (MSP).

Download this now


Finding Evil in the Haystack with RSA ECAT
By RSA | 4/12/2015

With thousands of workstations ans servers under management, most enterprises have noway to effectively make sure they are free of malware and other advanced threats. Today, many sophisticated, targeted attacks rely heavily on unknown (zero-day) vulnerabilities that are delivered leveraging social engineering tactics. Numerous hacking events made public recently have highlighted the vulnerabilities of even the most renowned security companies, government, contractors and fortune 500 enterprises. The problem can affect any enterprise and a new approach to compact these threats must be implemented in order to deal with it effectively.

Download this now


McAfee Whitepaper: Building the Business Case for Privacy
By McAfee Australia | 9/5/2013

A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation

Download this now


New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (Sponsored by McAfee)
By McAfee Australia | 18/3/2013

The latest version of the flagship McAfee® Gateway Anti-Malware technology adapts to new threats and plans for future threats with a modular design that allows for the easy addition of components for maximum flexibility for future malicious exploit trends.

Download this now


Modernizing Security for the Small and Mid-Sized Business – Recommendations for 2013 (Sponsored by McAfee)
By McAfee Australia | 18/3/2013

As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Specifically, email security, web security and secure file sharing should be considered foundational security capabilities for every small and mid-sized business, in addition to anti-virus and firewalls.

Download this now


Stop Password Sprawl with SaaS Single Sign-On via Active Directory
By Centrify | 10/12/2012

This whitepaper addresses how to deal with the cost and complexity of managing additional identity silos during the adoption of new SaaS, including integration costs, increased help desk load and lower productivity as users struggle with multiple passwords, password policies and frustrating login interfaces for browsers and client applications on mobile devices.

Download this now


A Practical Path to Unified Identity Across Data Center, Cloud and Mobile
By Centrify | 10/12/2012

This whitepaper looks at the major trends challenging IT organizations today and the increasing heterogeneity and hybridization of platforms inside and outside the organization, the rush to deploy SaaS applications and the explosion in smart phone and tablet devices users are bringing to work to for personal productivity.

Download this now


IDG Strategy Guide: Privileged Identity Management Guide
By Centrify | 15/10/2012

This strategy guide outlines the key criteria for implementing a secure and effective privileged identity system and avoiding the most common pitfalls.

Download this now