Cloud Security Whitepapers


Sort by: Date | Company | Title


The Enemy Within
By Clearswift Asia Pacific | 1/11/2013
The proposed amendments to the Privacy Act, due to come into effect in 2014, reinforce both the importance and significance of upholding data security. Data protection has long been a priority for many businesses, but the rise in technology trends only create challenges in security protection. This research looks at how businesses are more likely to encounter breaches due to lack or awareness from employees rather than from malicious intent.
Download this now


Walk the Security Tightrope without Losing Your Balance
By SafeNet | 28/10/2013
The balance between employees’ satisfaction and protection has always been a struggle for IT administrators. There is a clear trend that secure access to enterprise and cloud resources has become a top priority and the challenge has become how you can balance security needs whilst keeping costs down and access convenient. This whitepaper looks at the recent innovations in two-factor authentication and how enterprises successfully walk this tightrope.
Download this now


Evolving Threats Demand; New Approaches To Security
By Akamai Technologies | 28/10/2013
As the world becomes increasingly hyper-connected, the opportunities for innovation and new business models are virtually limitless. However, with so much business-critical information at stake, the need to protect a company's IT assets is more important than ever before. This paper aims to profile the emerging players who comprise today’s emerging threat ecosystem; today's trends and the latest insights into the future.
Download this now


Integration with Oracle Fusion Financials Cloud Service
By Oracle | 15/10/2013
Greater flexibility, improved performance, lower costs – the list of cloud benefits goes on and on. While moving your financial system to the cloud may seem straightforward, truly realizing the advantages of the cloud requires a complete understanding how it will integrate with existing applications and systems. This valuable resource explores the need for seamless integration when adopting a cloud strategy, and introduces an approach that can ease your integration woes. Read on to learn more now.
Download this now


Delivering a Secure Cloud
By Trend Micro Australia | 14/10/2013
In this video, we hear from Sanjay Mehta, Managing Director of Trend Micro, on solutions that allow customers to secure their applications and data, whilst enjoying the benefits of Amazon Web Services Cloud Solutions.
Download this now


Global Cloud Security Software Market
By Trend Micro Australia | 14/10/2013
Even though the Global Cloud Security Software market is currently growing at a rate of over 25%, the market is pegged with strong growth inhibitors, including the lack of awareness among end-users about the risks associated with cloud computing. In this whitepaper, we look at the market as a whole and its direction into the future.
Download this now


Fraud in Insurance
By IBM Australia | 26/9/2013
Cunningham Lindsey, a leading claims management company that specializes in fraud, not only uncovered an organized fraud ring but also established an efficient process for helping their insurance customers identify legitimate claims from the fraudulent ones. In this case study, find out how possible fraudulent claims were flagged, leading to the discovery of a criminal fraud.
Download this now


Defeating External and Internal Fraud
By IBM Australia | 26/9/2013
The amount of money lost to fraud a year is staggering:globally, organisations lose 5% or $2.9 trillion in revenue annually. Today's fraud is committed on electronic networks at lightning speed by global rings of criminals, terrorists and insiders using sophisticated methods hidden in complex layers of transactional data. Download to find out how to empower analysts to search multiple data sources simultaneously to visualise transactions and timelines.
Download this now


Fraud Intelligence Analysis
By IBM Australia | 26/9/2013
Fraud is significantly and evolving challenge for the financial industry, costing an estimated five to eight percent of revenues per annum. Companies had traditionally countered fraud with solutions that target known threats, however this 'rear-view-approach' can also fail to spot new and emerging attacks. In this whitepaper, we look at critical insights that aid in investigating complex incidents, whilst producing actionable visualisation. Click to download!
Download this now


Choosing the Right Email Security Deployment
By Cisco Systems Australia | 2/7/2012
Enterprises of all sizes face the same daunting challenges – increasing mail volumes and new, evolving threats. The Cisco Cloud Security family of services provides customers superior choice of deployment models built on the solid foundation of industry-leading email security technology that protects 40 percent of Fortune 1000 companies from inbound threats and outbound data loss possibilities. Read more.
Download this now