Business management Whitepapers


Sort by: Date | Company | Title


Vendors Enhance Threat Mitigation And Cloud Capabilities
By CA Pacific | 3/2/2016

Forrester Wave Report for Privileged Identity Management provides a thorough evaluation of all the vendors offering Privileged Management solutions. Today’s economic environment is forcing S&R professionals to consider alternatives to on-premises solutions and use cloud services. Leaders in the PIM space now offer cloud support, threat mitigation to prevent data breaches, and privileged identity intelligence.

Download this now


Security Executive Brief: Best Practices and a Maturity Model for Securing Privileged Identities
By CA Pacific | 3/2/2016

This guide provides 22 specific actions that you can take to more effectively control privileged user accounts and access across your organisation in the context of a maturity model.

Download this now


The leadership handbook
By Citrix | 20/10/2015

The role of a business manager or team leader is often dynamic and complex. Find out the different roles and responsibilities a leader has to play. From a performance manager who keeps staff focused to a communication manager that is respectful and asks the right questions. Included are also tools you will need to increase your team’s productivity.

Download this now


Protecting critical-value data from the inside
By Nuix | 5/8/2015

More than one-third of all cyber crime incidents and security breaches are caused by insiders. This whitepaper looks at how to develop a proactive insider threat mitigation program that combines three key elements: executive leadership and advocacy, clear policy and guidance, and workforce education and training. With these elements in place, your organisation can address insider threats before they become messy and costly public problems.

Download this now


The good shepherd model for cybersecurity
By Nuix | 5/8/2015

This whitepaper will focus on how and why Australian public service must adopt the information security disciplines to locate important data, understand what it’s worth and make sure it’s protected. The paper will examine how government agencies can reduce the extent and damage of cyber security breaches by becoming ‘good shepherds’ of their data.

Download this now


Information governance: Building business value from dark data
By Nuix | 5/8/2015

Data has been growing faster than the ability to manage it. As a result, organisations cannot say for sure how much information they have, where it is or what secrets and risks it contains – it is effectively ‘dark data’. This whitepaper looks at how to address the situation with a new 4-stage approach by using technology tools and processes to enable information managers to search and govern all their unstructured data consistently and repeatedly.

Download this now


Just add intelligence: Building knowledge, experience and expertise into cyber security incident response
By Nuix | 5/8/2015

The faster cyber security investigators can identify and contain data breaches, the less cost and damage their organisation will suffer. But hiring or contracting expert investigators can be expensive. This whitepaper looks at how technology can encapsulate this expert knowledge into a framework for investigating insider data breaches and external web server attacks.

Download this now


It’s all about the data
By Nuix | 5/8/2015

Unstructured data formats are much harder to search and analyse than databases or simple text. In this context, ‘big data’ is a challenge, not an advantage. This whitepaper looks at how you can apply a data-centric approach across diverse business areas and shows how, having cracked open the content of unstructured data, your organisation can develop processes and competencies that will reduce costs, improve efficiency and deliver new sources of business value.

Download this now


Financial institution hunts for contracts in the wild with sensitive data finder
By Nuix | 5/8/2015

This case study looks at how a large financial institution used a sensitive data finder to locate vendor contracts that employees had stored in difficult-to-search locations such as email and file shares. Read how they were able to efficiently search very rapidly across massive volumes of data, conduct complex searches without creating a permanent index to help the firm fine-tune its searches and improve detection accuracy for each system.

Download this now


SAP Hana is the answer! What’s the question?
By SAP Australia | 13/7/2015

In most discussions today with SAP representatives, it’s very likely that the answer to almost any question that AD&D professionals ask is “SAP Hana.” Over time, this can build to a level of frustration, or even annoyance, for interested clients. However, there’s a good reason behind this. This whitepaper looks at the different use cases for SAP Hana, separates the hype from reality about the product and delves into how you build your SAP Hana road map to fully leverage your investment.

Download this now