Data Centre Whitepapers


Sort by: Date | Company | Title


Protecting critical-value data from the inside
By Nuix | 5/8/2015
More than one-third of all cyber crime incidents and security breaches are caused by insiders. This whitepaper looks at how to develop a proactive insider threat mitigation program that combines three key elements: executive leadership and advocacy, clear policy and guidance, and workforce education and training. With these elements in place, your organisation can address insider threats before they become messy and costly public problems.
Download this now


The good shepherd model for cybersecurity
By Nuix | 5/8/2015
This whitepaper will focus on how and why Australian public service must adopt the information security disciplines to locate important data, understand what it’s worth and make sure it’s protected. The paper will examine how government agencies can reduce the extent and damage of cyber security breaches by becoming ‘good shepherds’ of their data.
Download this now


Information governance: Building business value from dark data
By Nuix | 5/8/2015
Data has been growing faster than the ability to manage it. As a result, organisations cannot say for sure how much information they have, where it is or what secrets and risks it contains – it is effectively ‘dark data’. This whitepaper looks at how to address the situation with a new 4-stage approach by using technology tools and processes to enable information managers to search and govern all their unstructured data consistently and repeatably.
Download this now


Just add intelligence: Building knowledge, experience and expertise into cyber security incident response
By Nuix | 5/8/2015
The faster cyber security investigators can identify and contain data breaches, the less cost and damage their organisation will suffer. But hiring or contracting expert investigators can be expensive. This whitepaper looks at how technology can encapsulate this expert knowledge into a framework for investigating insider data breaches and external web server attacks.
Download this now


It’s all about the data
By Nuix | 5/8/2015
Unstructured data formats are much harder to search and analyse than databases or simple text. In this context, ‘big data’ is a challenge, not an advantage. This whitepaper looks at how you can apply a data-centric approach across diverse business areas and shows how, having cracked open the content of unstructured data, your organisation can develop processes and competencies that will reduce costs, improve efficiency and deliver new sources of business value.
Download this now


Financial institution hunts for contracts in the wild with sensitive data finder
By Nuix | 5/8/2015
This case study looks at how a large financial institution used a sensitive data finder to locate vendor contracts that employees had stored in difficult-to-search locations such as email and file shares. Read how they were able to efficiently search very rapidly across massive volumes of data, conduct complex searches without creating a permanent index to help the firm fine-tune its searches and improve detection accuracy for each system.
Download this now


IDC: Critical need for edge data protection
By CommVault | 24/6/2015
Many firms are acutely aware of the costs and risks associated with lost or unrecoverable data on employee devices, including desktops, laptops, and mobile devices and while mobility initiatives, including bring your own device (BYOD), are gaining popularity, IDC has discovered that many firms do not have adequate protection, recovery policies or tools in place to manage their ever-increasing volumes of data. Read why IDC believes the need to protect sensitive data residing on desktops, laptops, and mobile devices is more critical than ever and how CommVault Edge can meet end user demands by delivering a solution that is secure and allows users access to their data anywhere and at any time.
Download this now


Game changer: unlocking employee access to information
By CommVault | 24/6/2015
A February 2013 research study revealed some telling statistics among CIOs and Senior IT Managers about the state of their managed data. Most notably: Mobile access to company data is of paramount importance, Large enterprises are having trouble locating data across their databases, IT teams are overburdened, and business decisions are being hampered by time spent managing data silos. Organizations express interest in a solution that enables them to protect, manage and access all data across the enterprise from a single platform. Discover what IT leaders like yourself have expressed as their biggest challenges when it comes to managing data today, and arm yourself with the tools to change the data management game inside of your organisation.
Download this now


CIO Spotlight: 3 ways a next-generation email archive delivers true business value
By CommVault | 24/6/2015
Email archiving is a little bit like driving your reliable car. You expect it to operate smoothly, day after day, and do not necessarily plan for any crisis events such as a sudden engine failure. That is about the same perception many enterprises have about email. They don't worry about backup, about archiving, about eDiscovery, until, as one IT administrator said, something goes wrong. As the CIO whose diverse responsibilities includes budget control, cost avoidance, risk mitigation, data management and supporting the operational excellence of the enterprise as a whole, email archiving may not always be top of mind. Until something goes wrong. Read this whitepaper to learn how next-gen email archive delivers true business value.
Download this now


Solving your top 5 email archiving challenges
By CommVault | 24/6/2015
According to IDC, sixty percent (60%) of business critical information is now stored, sometimes exclusively, in email. It۪s more important than ever to establish an email archiving strategy that ensures business continuity and information availability. Modern email archiving solutions are changing to accommodate the new realities of the digital workplace and can intelligently store, manage and discover email content to meet business and compliance requirements. Read this paper to learn how to solve your top email challenges.
Download this now
CIO
ARN
Techworld
CMO