Data Whitepapers


Sort by: Date | Company | Title


Secure archive: maximise primary storage ROI and data protection
By Nexan | 5/3/2015
With costly primary storage rapidly filling up (and slowing down), the need to migrate data into a more cost-effective storage tier is clear. This whitepaper looks at: <br> <ul> <li>How IT professionals can reconcile with today’s constrained budgets while still growing their storage availability</li> <li>How to optimise storage by moving infrequently-accessed data from expensive storage to lower cost secondary storage</li> <li>And, how to address data loss in the storage optimisation process</li> </ul> </br>
Download this now


Dealing with the data deluge
By Symantec | 28/1/2015
CIO Australia’s Custom Research Group asked more than 100 CIOs, IT, network and infrastructure managers, and chief data and security officers about how they are dealing with the data deluge. These findings look at the growth and challenges for organisations tapping into information, what’s stalling good data management; and statistics on spending, efficiency and ownership.
Download this now


Citrix NetScaler - A foundation of next-generation datacentre security
By Citrix Systems Asia Pacific | 12/1/2015
The need for robust data centre security has never been greater. This whitepaper looks at the traditional challenges and concerns as well as the new in the evolving requirements for security. •Traditional firewalls lack the visibility and control required to protect against the more the 70% of internet attacks •The capabilities of your data centre security should cover application, infrastructure, identity and security fabric •Mounting budget requirements means organisations look to do more with less
Download this now


Application-Aware Storage for Virtual Environments
By Tintri | 9/1/2015
The main benefit of an application-aware storage model is that it allows the storage for each individual application to be managed and optimized independently, regardless of what other workloads and applications are present. Storage system features like high performance, balanced scalability, data reduction, and an application-aware management paradigm are critical to the efficient use of storage resources.
Download this now


Ensuring robust data integrity
By Tintri | 9/1/2015
This white paper describes how the Tintri OS and its underlying file system provide unparalleled data integrity and intelligent performance for serving hundreds of VMs in a single appliance. It also examines Tintri's proprietary redundant array of independent disks (RAID) implementation for comprehensive data integrity.
Download this now


Fight malware, malfeasance, and malingering with F5
By F5 Networks | 12/11/2014
Organisations are seeking greater control over their outbound security. They’re looking to find solutions that offer the greatest protection and control to prevent data loss, ensure compliance and increase productivity. Where should they start? •Every year brings an even more extreme set of threats to the enterprise than the last •The push for increased confidentiality and the use of SSL everywhere has made it more difficult for enterprises to monitor Internet usage •While there are solutions that can help mitigate some of these risks, it’s critical for enterprises to adopt a comprehensive and streamlined way to maintain visibility and control
Download this now


Symantec Business Data Protection Kit
By Symantec | 24/10/2014
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
Download this now


40/100 Gigabit Ethernet: The foundation of virtualized data centre and campus networks
By Anixter Australia | 29/9/2014
This whitepaper explains how effective planning and implementation for 40/100 Gigabit Ethernet can allow organizations to remove potential road blocks and take full advantage of virtualized environments. ·With virtualization, considerations must be made regarding users, resources, and infrastructure investment ·40/100GbE is gaining traction as a foundation for building next generation virtualized data centre/campus environments ·Discover how to improve capacity and enjoy a smooth upgrade path with the increasingly dominant standard
Download this now


Integration: Why ‘good enough’ doesn’t cut it
By Tibco | 12/9/2014
The fact that digitalisation exists doesn’t mean it’s available and actionable. This paper explains why true integration is not possible with merely adequate technology. • Digitalisation improves user experience, availability and performance, processing power and decision-making • You owe it to yourself and your organization to go beyond “good enough” • Using a proven platform will mean improved business agility with the ability to establish new partnerships
Download this now


Continous application availability with EMC VPLEX
By EMC Corporation | 8/9/2014
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
Download this now