Network security Whitepapers


Sort by: Date | Company | Title


How Australian Organisations Are Making the Business Case for Network Virtualization and Security
By VMware Australia | 6/5/2016

Australia is a world leader in its take-up of virtualization. CIOs have put the technology into server and desktop environments in large numbers. The next Holy Grail is the network. Step inside the business cases for network virtualization of top Australian organisations including the Australian Bureau of Statistics, Macquarie Telecom, Zettagrid, Telcos, universities and more.

- Learn how they convinced the business to get their projects over the line

- Discover how they convinced network engineers to embrace automation

- Realise new ways to secure traffic in your IT environment or data centre

- Identify quick wins based on actual Australian real-world production deployments

- Support your own proposal with the most up-to-the-minute advice

Join over 700 NSX customers worldwide as they harness the future of networking and security. Access your free copy of our new, independent, qualitative study, How Australian organisations are making the business case for network virtualization and security, today.

Download this now


Redefining networks for cloud, analytics, mobile, social and security
By IBM Australia | 19/8/2015

Much has been written about cloud, big data and analytics, mobile, social, and IT security as significant forces that are transforming information technology and business, but what about their impact on networking?

This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data centre and enterprise networks and the changes that organisations will need to make in order to capitalise on these technology forces.

Download this now


F5 data center firewall aces performance test
By F5 Networks | 16/7/2014

"The F5 firewall came up aces, maxing out network capacity while also offering sophisticated filtering and attack protection capabilities" slide. Read this network World performance test

Download this now


Security in a Faster Forward World
By Akamai Technologies | 23/1/2014

Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.

Download this now


Reducing Costs With Next-generation Firewalls
By Palo Alto Networks | 14/11/2013

For enterprise IT security organizations, the evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. This paper examines three different organizations, the legacy infrastructure they replaced, the firewalls they deployed and the subsequent savings.

Download this now


Managing Web Security in an Increasingly Challenging Threat Landscape
By Webroot | 5/9/2013

Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.

Download this now


Benchmarks for Security - A Comparative Test
By Webroot | 5/9/2013

In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!

Download this now


Batten Down the Hatches! A Guide to Protecting Data in Motion
By Senetas Corporation | 17/5/2013

The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.

Download this now


In Control at Layer 2: A Tectonic Shift in Network Security
By Senetas Corporation | 8/4/2013

Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.

Download this now


Why Encrypt? - Securing email without compromising communications
By Clearswift Asia Pacific | 31/7/2012

There’s an old saying that a ship is safe in the harbour, but that’s not what ships are for. The same can be said of enterprise data. If a company’s success is increasingly determined by its ability to act on information, a fundamental requirement of that success is the enablement of unfettered communications between co-workers, partners and clients. Read more.

Download this now

Market Place