Data Whitepapers


Sort by: Date | Company | Title


Responding to - and recovering from - sophisticated security attacks
By IBM Australia | 26/3/2015
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to - and recovering from - sophisticated security attacks” details four proactive steps that you can - and should - take now to help keep your organisation safe: prioritise your business objectives and set your risk tolerance; protect your organisation with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organisation safe from sophisticated security attacks and find out how IBM can help.
Download this now


2014 Ponemon Cost of data breach study
By IBM Australia | 26/3/2015
IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn.
Download this now


Consolidating older database servers with Dell PowerEdge R730xd Using Sandisk DAS Cache
By Dell | 23/3/2015
Principled Technologies tested database performance of a four-year-old IBM System x3650 M3 server running Windows Server 2003 R3. They also looked at the database performance of two configurations of the Dell PowerEdge R730xd. Find out which configuration performed best in this full report.
Download this now


How faster database performance can change the face of an organisation
By Dell | 19/3/2015
The faster customers and employees can access their data, the better. This whitepaper looks at the performance of two popular caching services to see where the biggest advantages are. See how: caching software speeds up applications to handle higher level transactions, two system configurations can yield extremely different results and having a system that doesn't perform can hold back your business.
Download this now


Simplified systems management
By Dell | 18/3/2015
This infographic looks at how you can minimise administrator time by streamlining management and ultimately improving the bottom line with Dell OpenManage. Find out how you can get 97% faster deployment, easier updating, improved connectivity and spend 91% less time managing configuration baselines.
Download this now


Secure archive: maximise primary storage ROI and data protection
By Nexan | 5/3/2015
With costly primary storage rapidly filling up (and slowing down), the need to migrate data into a more cost-effective storage tier is clear. This whitepaper looks at: how IT professionals can reconcile with today’s constrained budgets while still growing their storage availability, how to optimise storage by moving infrequently-accessed data from expensive storage to lower cost secondary storage, and how to address data loss in the storage optimisation process
Download this now


Dealing with the data deluge
By Symantec | 28/1/2015
CIO Australia’s Custom Research Group asked more than 100 CIOs, IT, network and infrastructure managers, and chief data and security officers about how they are dealing with the data deluge. These findings look at the growth and challenges for organisations tapping into information, what’s stalling good data management; and statistics on spending, efficiency and ownership.
Download this now


Citrix NetScaler - A foundation of next-generation datacentre security
By Citrix Systems Asia Pacific | 12/1/2015
The need for robust data centre security has never been greater. This whitepaper looks at the traditional challenges and concerns as well as the new in the evolving requirements for security. •Traditional firewalls lack the visibility and control required to protect against the more the 70% of internet attacks •The capabilities of your data centre security should cover application, infrastructure, identity and security fabric •Mounting budget requirements means organisations look to do more with less
Download this now


Application-Aware Storage for Virtual Environments
By Tintri | 9/1/2015
The main benefit of an application-aware storage model is that it allows the storage for each individual application to be managed and optimized independently, regardless of what other workloads and applications are present. Storage system features like high performance, balanced scalability, data reduction, and an application-aware management paradigm are critical to the efficient use of storage resources.
Download this now


Ensuring robust data integrity
By Tintri | 9/1/2015
This white paper describes how the Tintri OS and its underlying file system provide unparalleled data integrity and intelligent performance for serving hundreds of VMs in a single appliance. It also examines Tintri's proprietary redundant array of independent disks (RAID) implementation for comprehensive data integrity.
Download this now