Data Centre Whitepapers


Sort by: Date | Company | Title


Availability for the Always-on Enterprise: Business and IT Perspectives
By Veeam | 18/5/2016

Businesses today often face the same challenges such as exponential data growth, a constant stream of new technologies and flat budgets. These challenges can hold your business back. For those that adopt innovative solutions or fresh approaches, however, these challenges become great opportunities to beat the competition by serving internal and external customers more effectively and efficiently.

Download this now


2016 Veeam Availability Report: How to close a widening Availability Gap
By Veeam | 18/5/2016

While business transformation is driven by a new breed of user — one that desires a seamless, connected experience — the ability for modern enterprises to deliver non-stop services and continually innovate has never been more urgent. However, are today’s businesses delivering what users need?

Download this now


Why Businesses Are Adopting Network Virtualization
By VMware Australia | 6/5/2016

Networking virtualization is not an all-or-nothing proposition. It can benefit different organisations with different needs, or it can beget a host of benefits for any one organisation.

Pick your purpose. Need to beef up security for your data centre? Eager to accelerate your IT processes? Aiming to keep your applications up and running? In fact, you can choose to virtualize part of your network to pin down any one of these objectives, or take virtualization across your entire network to accomplish all of them. And what’s more, it only takes one such objective to make the move worth your while.

In this paper, we will explore the advantages that make network virtualization attractive to IT organizations in the first place, identify how network virtualization might suit your business scenario, and see how VMware customers are putting VMware NSX® to work for them.

Download this now


Micro-segmentation for Dummies eBook
By VMware Australia | 2/2/2016

This eBook provides a broad overview of micro-segmentation in the data centre. After reading this , you’ll have a good basic understanding of micro-segmentation — like you’d get from a college-level 101 class, but far more interesting than Microbiology 101 or Microeconomics 101 (and not as difficult either)!

Download this now


Flash arrays accelerate innovation
By EMC/Thomas Duryea | 11/9/2015

This IDC infographic looks at how flash is designed to meet the new levels of intelligence needed to help organisations develop applications that accelerate business innovation and how the increase in flash storage adoption will change the landscape by 2018.

Download this now


Protecting critical-value data from the inside
By Nuix | 5/8/2015

More than one-third of all cyber crime incidents and security breaches are caused by insiders. This whitepaper looks at how to develop a proactive insider threat mitigation program that combines three key elements: executive leadership and advocacy, clear policy and guidance, and workforce education and training. With these elements in place, your organisation can address insider threats before they become messy and costly public problems.

Download this now


The good shepherd model for cybersecurity
By Nuix | 5/8/2015

This whitepaper will focus on how and why Australian public service must adopt the information security disciplines to locate important data, understand what it’s worth and make sure it’s protected. The paper will examine how government agencies can reduce the extent and damage of cyber security breaches by becoming ‘good shepherds’ of their data.

Download this now


Information governance: Building business value from dark data
By Nuix | 5/8/2015

Data has been growing faster than the ability to manage it. As a result, organisations cannot say for sure how much information they have, where it is or what secrets and risks it contains – it is effectively ‘dark data’. This whitepaper looks at how to address the situation with a new 4-stage approach by using technology tools and processes to enable information managers to search and govern all their unstructured data consistently and repeatedly.

Download this now


Just add intelligence: Building knowledge, experience and expertise into cyber security incident response
By Nuix | 5/8/2015

The faster cyber security investigators can identify and contain data breaches, the less cost and damage their organisation will suffer. But hiring or contracting expert investigators can be expensive. This whitepaper looks at how technology can encapsulate this expert knowledge into a framework for investigating insider data breaches and external web server attacks.

Download this now


It’s all about the data
By Nuix | 5/8/2015

Unstructured data formats are much harder to search and analyse than databases or simple text. In this context, ‘big data’ is a challenge, not an advantage. This whitepaper looks at how you can apply a data-centric approach across diverse business areas and shows how, having cracked open the content of unstructured data, your organisation can develop processes and competencies that will reduce costs, improve efficiency and deliver new sources of business value.

Download this now

Market Place