Data management Whitepapers


Sort by: Date | Company | Title


The virtue of virtualisation
By Crosspoint Telecom | 26/8/2015
The world of virtualisation may seem complex, however it’s clear that moving to a virtual IT environment can deliver many cost and efficiency benefits. This whitepaper looks at how emerging technologies such as cloud based services, moving desktops and application virtualisation helping to create a streamlined, responsive and flexible virtual environment, your business will be well positioned to capitalise on future growth opportunities.
Download this now


The death of tapes
By Crosspoint Telecom | 26/8/2015
Backing up to tape has been the standard for around 50 years. There are many perceived reasons as to why tapes are the best backup solution...they’re reliable, cheap, re-usable and easy to store. This whitepaper looks at how these benefits are now being challenged in the face of modern cloud-based and de-duplication backup solutions and what’s in store for the future.
Download this now


Disaster recovery and verification
By Crosspoint Telecom | 26/8/2015
Business continuity and disaster recovery are critical issues and top priorities for any IT department. This whitepaper looks at how you can best guarantee the security of your data, knowing that lost data can be recovered in the event of server failure, and have the ability to quickly get your business up and running again.
Download this now


Redefining networks for cloud, analytics, mobile, social and security
By IBM Australia | 19/8/2015
Much has been written about cloud, big data and analytics, mobile, social, and IT security as significant forces that are transforming information technology and business, but what about their impact on networking? This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data centre and enterprise networks and the changes that organisations will need to make in order to capitalise on these technology forces.
Download this now


Designing a secure DNS architecture
By Infoblox | 5/8/2015
In today’s networking landscape, it is no longer adequate to have a DNS infrastructure that simply responds to queries. This whitepaper looks at how you can utilise a comprehensive, secure, and scalable DNS solution that not only provides low latency and high throughput, but also ensures availability of essential infrastructure to enable your organisation to both grow and stay protected without the need for frequent infrastructure upgrades.
Download this now


The rising tide of DNS threats: are you prepared?
By Infoblox | 5/8/2015
This infographic looks at the state of DNS threats around the world today. Find out the top 12 DNS attacks, why the impact of attacks can cost companies more than $100,000 per hour, and where majority of the attacks are stemming from.
Download this now


Protecting critical-value data from the inside
By Nuix | 5/8/2015
More than one-third of all cyber crime incidents and security breaches are caused by insiders. This whitepaper looks at how to develop a proactive insider threat mitigation program that combines three key elements: executive leadership and advocacy, clear policy and guidance, and workforce education and training. With these elements in place, your organisation can address insider threats before they become messy and costly public problems.
Download this now


The good shepherd model for cybersecurity
By Nuix | 5/8/2015
This whitepaper will focus on how and why Australian public service must adopt the information security disciplines to locate important data, understand what it’s worth and make sure it’s protected. The paper will examine how government agencies can reduce the extent and damage of cyber security breaches by becoming ‘good shepherds’ of their data.
Download this now


Information governance: Building business value from dark data
By Nuix | 5/8/2015
Data has been growing faster than the ability to manage it. As a result, organisations cannot say for sure how much information they have, where it is or what secrets and risks it contains – it is effectively ‘dark data’. This whitepaper looks at how to address the situation with a new 4-stage approach by using technology tools and processes to enable information managers to search and govern all their unstructured data consistently and repeatably.
Download this now


Just add intelligence: Building knowledge, experience and expertise into cyber security incident response
By Nuix | 5/8/2015
The faster cyber security investigators can identify and contain data breaches, the less cost and damage their organisation will suffer. But hiring or contracting expert investigators can be expensive. This whitepaper looks at how technology can encapsulate this expert knowledge into a framework for investigating insider data breaches and external web server attacks.
Download this now