Whitepapers


Sort by: Date | Company | Title


The Forrester Wave - Mobile Development Platforms: The 12 Providers that matter the most and how they stack up
By IBM Australia | 12/1/2017

The report evaluates mobile development platform (MDP) vendors, the 12 most significant ones were researched, analysed and scored. This report details the findings about how well each vendor fulfils the criteria and where they stand in relation to each other to help application development and delivery (AD&D) professionals select the right partner for their mobile development platform needs.

Download this now


Return on Mobile: Capturing the value beneath the surface
By IBM Australia | 12/1/2017

This executive report, based on surveys of more than 1,000 Global C-suite and mobile executives from 18 industries, will explore the vast opportunities hidden from view. Further, we will show how different groups of organisations—Growers, Opportunists and Experimenters—approach ROI. Finally, we will use the best practices of the most successful organisations in our study, as well as insights gained from analysis of responses to questions in our interviews, to provide a path forward for those organisations wishing to explore new opportunities for greater ROI on mobile.

Download this now


Star qualities: What it takes for mobile development projects to succeed
By IBM Australia | 12/1/2017

How do some development projects deliver great applications—meeting expectations, on time and on budget—when most don’t? The secret, it turns out, lies in having both the right team and the right approach.

Download this now


Why good apps are not good enough?
By IBM Australia | 12/1/2017

This Forrester report evaluates what turns consumers and other users both off and onto a mobile app (and its authoring brand), focusing on the following questions: What elevates a good, serviceable, and even profitable app into the realm of great? And if a mobile app achieves greatness, what is the impact?

Download this now


The Video Conferencing “Cloud of Confusion”
By StarLeaf | 12/12/2016

The cloud has become a buzz word across all industries with the concept generating a renewed interest in the world of video conferencing through excitement about possible new features and capabilities. However, there is still some confusion amongst enterprise customers, channel partners and even vendors about the pros, cons and risks associated with cloud services. This white paper seeks to dispel myths surrounding video conferencing cloud services and provide readers with clear answers to the questions that conferencing mangers are often afraid to ask.

Download this now


Skype for Business Migration Strategies
By StarLeaf | 12/12/2016

Skype for Business is fast becoming the most widely-used single vendor unified communications platform. However, enterprises that implement Skype for Business are finding that there is no sophisticated way for existing video conferencing equipment to seamlessly integrate with it, leaving enterprises facing a major challenge in their meeting rooms. This white paper addresses the available migration strategies for video calling and conferencing and discusses how interoperability between Skype for Business and professional videos systems can be achieved.

Download this now


Preserving Investment in Existing Video Equipment
By StarLeaf | 12/12/2016

Over recent years, the video cloud has emerged as a platform with the ability to provide a host of rich services which include conferencing, recording and direct calling between two video endpoints. This infrastructure in the cloud allows for resilient, scalable and secure capabilities that have the ability to future proof existing video installations and make the introduction of new technologies that much easier. This white paper explores the ways in which businesses can continue to leverage current video endpoint systems, by removing legacy infrastructure and migrating to a video cloud.

Download this now


Ransomware: Is Zepto the new Locky?
By Sophos | 12/12/2016

This webcast covers:

- Anatomy of a ransomware attack

- The latest ransonware to rear its ugly head - introducing Locky and its friends

- Why these attacks are so successful

- Practical steps to protect your organisation from ransomware threats

- How Sophos can help

Download this now


How to Stay Protected Against Ransomware
By Sophos | 12/12/2016

Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organisation’s productivity.

But what does a typical attack look like? And what security solutions should be in place to give the best possible defense?

This paper examines commonly used techniques to deliver ransomware, looks at why attacks are succeeding, and gives nine security recommendations to help you stay secure. It also highlights the critical security technologies that every IT setup should include.

Download this now


Exploits. Intercepted.
By Sophos | 12/12/2016

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads.

Read this paper to learn more about exploits and how to stop them. It explores how exploits work, the exploit industry, what makes a good exploit in the eyes of the cybercriminals, and also how anti-exploit technology is a highly efficient and effective way to secure your organisation against advanced and unknown threats.

Download this now

Market Place