Data Whitepapers


Sort by: Date | Company | Title


Contractor access: Mitigating security and risk issues
By Attachmate Australasia | 14/8/2014
Today’s workforce is expanding to include a growing number of contractors, despite high-profile security incidents. This paper identifies how to mitigate risks in what’s often a necessary business decision. · Many businesses don’t really have the luxury of asking, “can we afford the risk of a contractor?” · Companies like Target, Cogent Healthcare, Stanford Hospital, Beebe Healthcare and even the EPA have had breaches that were the result of “temporary” access · A substantial roadblock to productivity is granting them access to necessary systems, which in many cases house sensitive information
Download this now


The complete guide to log and event management
By Attachmate Australasia | 13/8/2014
Everybody has logs and ultimately will have to deal with them. In this guide, Dr. Anton Chuvakin analyses the relationship between SIEM and log management for a new solution. · Security information and event management (SIEM) emerged in the 1990s, but it has always been controversial · This paper analyses the relationship between SIEM and log management, focusing on technical differences, uses and architecting joint deployments · Dr Chuvakin provides recommendations for companies that have deployed log management or SIEM so they can plot their roadmap for enhancing deployment
Download this now


Unleash Your Applications
By EMC Corporation | 29/5/2014
Opportunities to truly innovate are rare. Yet today, Flash technology has created the opportunity to not only deliver massive I/O performance, but to transform ease-of-use, array capabilities and business value. Welcome to the 100% Flash Enterprise Storage Array – where unimaginable performance is only the start.
Download this now


EMC XtremIO Executive Overview
By EMC Corporation | 29/5/2014
This white paper details how a 100% Flash-based scale-out enterprise storage array delivers high levels of performance and scalability; brings new levels of ease-of-use to SAN storage, while offering new features that help to deliver advanced performance and cost savings.
Download this now


Ponemon Institute Report: 2014 Cost of Data Breach Study: Australia
By IBM Australia | 2/5/2014
This whitepaper discusses the results from the 2014 Cost of Data Breach Study: Australia. In this year’s report, the fifth of its kind, the total average cost paid by a company in a breach increased to $2.8 million, while assessing the likelihood of a company having data breaches in the next 24 months.
Download this now


Field Service at a Crossroads: Mobility, Cloud and the Internet of Everything
By ClickSoftware Technologies | 30/4/2014
Internet expansion is moving beyond desktops and LANs, but many field service organizations have yet to explore the benefits of the Internet of Everything and expanded mobile connectivity. This whitepaper discusses the four basic usage models born from new data streams and services.
Download this now


Case Study:Increased visibility over the manufacturing production cycle
By Epicor | 9/4/2014
Read how ETEL Limited, a pioneering design and manufacture business in New Zealand, managed to perfect their expansion into new markets by utilising an ERP system to support growth and provide “one source for truth” accessible to the entire organisation.
Download this now


2013 Trends to Watch: Cloud Services
By Oracle | 27/3/2014
Cloud is now largely viewed by enterprise customers as a viable, sometimes necessary path to outsourcing and service delivery and is a strategic, mobile, and integrated platform which reduces short term IT costs and ensures long term savings. This document focuses on the trends that are driving decision-making on cloud including the growing connection between cloud, mobility, and data; cloud services governance and integration; and continuing development of cloud ecosystems among vendors. Learn how and why companies are deploying cloud services while managing security and compliance, and read how vendors are striving to become more innovative to meet new client needs.
Download this now


Unlocking the Power of Flash
By EMC Corporation | 21/2/2014
Continuous data growth coupled with a new generation of multi-core CPUs has placed new demands on storage systems. This whitepaper details why firms should consider moving from HDDs to higher-performance Flash media, with the adoption of new technology with a higher I/O intensity.
Download this now


A Smarter Approach to BYOD Management and Security
By Kaseya | 19/2/2014
This explosion of BYOD policies has taken a toll on already strained IT departments as they struggle to manage and secure corporate assets and data in this environment. This whitepaper details how containerization technologies can help to balance the corporation’s needs for manageability and security with employees’ demands for choice and freedom.
Download this now
CIO
ARN
Techworld
CMO