Data Whitepapers


Sort by: Date | Company | Title


2015 Cost of data breach study: impact of business continuity management
By IBM Australia | 19/8/2015
This global study involving 350 companies in 16 industry sectors looks at the impact of data breaches and trends. The results from this annual research give insight and a better understanding of the factors that can minimise the financial consequences of a data breach, as well as the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of breaches.
Download this now


Finding your way around B2B Integration: a field guide
By OpenText | 10/8/2015
While data flows at the speed of light within the four walls of a corporation, the information flowing between the firewalls of business partners often moves at a snail’s pace. This guide looks at the fours steps to B2B integration and explains the how you can utilise B2B integration to speed interactions and increase efficiency in plain english.
Download this now


Sharpening your competitive edge with B2B Managed Services
By OpenText | 10/8/2015
The ability to maintain a competitive edge in today’s marketplace is often driven by a company’s ability to match IT capabilities with its business strategy and processes. The potential benefits of B2B e-commerce solutions to increase the speed, accuracy, and flexibility of operations and improve visibility in the supply chain are well known, but many companies struggle to achieve them. This white paper shows how B2B managed services can improve the capabilities of your business and helps you ask the right questions and understand the answers when choosing a services provider.
Download this now


Protecting critical-value data from the inside
By Nuix | 5/8/2015
More than one-third of all cyber crime incidents and security breaches are caused by insiders. This whitepaper looks at how to develop a proactive insider threat mitigation program that combines three key elements: executive leadership and advocacy, clear policy and guidance, and workforce education and training. With these elements in place, your organisation can address insider threats before they become messy and costly public problems.
Download this now


The good shepherd model for cybersecurity
By Nuix | 5/8/2015
This whitepaper will focus on how and why Australian public service must adopt the information security disciplines to locate important data, understand what it’s worth and make sure it’s protected. The paper will examine how government agencies can reduce the extent and damage of cyber security breaches by becoming ‘good shepherds’ of their data.
Download this now


Information governance: Building business value from dark data
By Nuix | 5/8/2015
Data has been growing faster than the ability to manage it. As a result, organisations cannot say for sure how much information they have, where it is or what secrets and risks it contains – it is effectively ‘dark data’. This whitepaper looks at how to address the situation with a new 4-stage approach by using technology tools and processes to enable information managers to search and govern all their unstructured data consistently and repeatably.
Download this now


Just add intelligence: Building knowledge, experience and expertise into cyber security incident response
By Nuix | 5/8/2015
The faster cyber security investigators can identify and contain data breaches, the less cost and damage their organisation will suffer. But hiring or contracting expert investigators can be expensive. This whitepaper looks at how technology can encapsulate this expert knowledge into a framework for investigating insider data breaches and external web server attacks.
Download this now


It’s all about the data
By Nuix | 5/8/2015
Unstructured data formats are much harder to search and analyse than databases or simple text. In this context, ‘big data’ is a challenge, not an advantage. This whitepaper looks at how you can apply a data-centric approach across diverse business areas and shows how, having cracked open the content of unstructured data, your organisation can develop processes and competencies that will reduce costs, improve efficiency and deliver new sources of business value.
Download this now


Financial institution hunts for contracts in the wild with sensitive data finder
By Nuix | 5/8/2015
This case study looks at how a large financial institution used a sensitive data finder to locate vendor contracts that employees had stored in difficult-to-search locations such as email and file shares. Read how they were able to efficiently search very rapidly across massive volumes of data, conduct complex searches without creating a permanent index to help the firm fine-tune its searches and improve detection accuracy for each system.
Download this now


The Evolution of public cloud services in Australia
By Data#3 | 31/7/2015
With new locally based offerings in the market from global vendors like VMware and Microsoft, public cloud solutions in Australia have come of age. This paper will explore how this evolution is changing the considerations for customers looking to move services to public cloud environments.
Download this now