Business Whitepapers


Sort by: Date | Company | Title


Securing remote vendor access with privileged account security
By CyberArk | 26/8/2015
Remote, external users accessing your network from third-party organisations introduce a risk that can be mitigated. This whitepaper looks at how organisations can minimise the risk of unauthorised users exploiting accounts by implementing a control strategy that still enables businesses to partner effectively with outside parties while maintaining the same security standards across the entire organisation.
Download this now


Scan your network with CyberArk
By CyberArk | 26/8/2015
Privileged accounts are the pathway to a company’s most valuable data and are therefore compromised in the majority of advanced and internal attacks. Find out how you can use CyberArk to scan your network and discover where privileged accounts exist, assess security risks, identify and collect reliable and comprehensive information.
Download this now


Privileged account security solution
By CyberArk | 26/8/2015
Best practices dictate that privileged accounts should be incorporated into an organisation’s core security strategy. Privileged accounts are a security problem and need singular controls put in place to protect, monitor, detect and respond to all privileged account activity. This whitepaper looks at which security solution can protect you the best.
Download this now


Global financial services firm overcomes operational complexity
By CyberArk | 26/8/2015
This case study looks at how one of the oldest global financial services firms in the US overcame operational complexity by adopting a privileged identity management solution. They were able to drive down costs to lines of business through better use of automation and centralisation of databases.
Download this now


Case study: BT depends on CyberArk to secure and monitor privileged accounts
By CyberArk | 26/8/2015
This case study looks at how BT, one of the world’s leading communications services companies, implemented CyberArk to manage privileged accounts - going from a fragmented, un-scalable mix of solutions to one, streamlined solution that met all their goals in the short and long term.
Download this now


7 Things to consider when evaluating privileged account security solutions
By CyberArk | 26/8/2015
You’re convinced that protecting privileged accounts is paramount in your security strategy, But how do you go about selecting the right solutions from the right provider? You need a guide to know what to expect, and what to look for as you evaluate potential privileged account security solutions. To help you make informed decisions, this guide will give you the seven questions to ask every potential vendor.
Download this now


2015 Cost of data breach study: impact of business continuity management
By IBM Australia | 19/8/2015
This global study involving 350 companies in 16 industry sectors looks at the impact of data breaches and trends. The results from this annual research give insight and a better understanding of the factors that can minimise the financial consequences of a data breach, as well as the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of breaches.
Download this now


Designing a secure DNS architecture
By Infoblox | 5/8/2015
In today’s networking landscape, it is no longer adequate to have a DNS infrastructure that simply responds to queries. This whitepaper looks at how you can utilise a comprehensive, secure, and scalable DNS solution that not only provides low latency and high throughput, but also ensures availability of essential infrastructure to enable your organisation to both grow and stay protected without the need for frequent infrastructure upgrades.
Download this now


The rising tide of DNS threats: are you prepared?
By Infoblox | 5/8/2015
This infographic looks at the state of DNS threats around the world today. Find out the top 12 DNS attacks, why the impact of attacks can cost companies more than $100,000 per hour, and where majority of the attacks are stemming from.
Download this now


Tooling up for collaboration
By LogMeIn | 9/4/2015
Leading businesses are learning how to collaborate more effectively to drive business results.The evolution of the modern workforce is driven by necessity and opportunity. This whitepaper looks at insights on collaboration trends from forward-thinking analysts and business executives, the 5 main findings and predictions for the future of workplace collaboration and how companies can find real value in bringing the workforce together with meeting tools.
Download this now