White Papers: network


Sort by: Date | Company | Title


Defeating External and Internal Fraud
By IBM | 26/9/2013
The amount of money lost to fraud a year is staggering:globally, organisations lose 5% or $2.9 trillion in revenue annually. Today's fraud is committed on electronic networks at lightning speed by global rings of criminals, terrorists and insiders using sophisticated methods hidden in complex layers of transactional data. Download to find out how to empower analysts to search multiple data sources simultaneously to visualise transactions and timelines.
Download this now


Fraud Intelligence Analysis
By IBM | 26/9/2013
Fraud is significantly and evolving challenge for the financial industry, costing an estimated five to eight percent of revenues per annum. Companies had traditionally countered fraud with solutions that target known threats, however this 'rear-view-approach' can also fail to spot new and emerging attacks. In this whitepaper, we look at critical insights that aid in investigating complex incidents, whilst producing actionable visualisation. Click to download!
Download this now


Fighting Fraud with Big Data
By IBM | 26/9/2013
For industries with a full-time focus on fighting fraud, intelligence is invaluable. Whilst the annual cost of fraud is substantial and the benefits of reducing it are very real, we find that enterprises with proactive and predictive approaches to fighting fraud have a greater visibility and intelligence of possible fraud. Click to find out more.
Download this now


Carrier Class Product Assessment
By Alcatel-Lucent | 2/7/2013
One of the prevailing myths surrounding carrier class data centre solutions is that their implementation is either difficult to configure or create high maintenance costs. Network managers of telephony networks, due to high network demand, require resilience and simplicity in their design. In this whitepaper, we look at the strengths and weaknesses of competing enterprise data centre solution. Read now.
Download this now


NetApp FAS6240 Clustered SAN Champion of Champions
By NetApp | 17/4/2013
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.
Download this now


Bandwidth Bandits
By Symantec | 15/3/2013
Imagine if you gave up a quarter of your office space for non-work activities; it’s inconceivable. But when it comes to internet bandwidth, most companies loose the same proportion to employee web misuse, streaming media and spam. As a company’s internet is both costly and limited, click here to find out how best reduce bandwidth loss.
Download this now


Spear-Phishing Email: Most Favored APT Attack Bait
By Trend Micro | 30/11/2012
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Download this now


Detecting APT Activity with Network Traffic Analysis
By Trend Micro | 13/11/2012
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Download this now


BYOD Adoption Goes Beyond Devices And Requires Completely Rethinking The Network And Security
By Juniper Networks | 9/11/2012
The rapid adoption of Internet-enabled consumer devices has had a major impact on enterprise mobility strategies. This research shows that many BYOD programs are initially driven by access to email, and also indicates that organisations may be underestimating the implications for security and network architectures. View the full research paper.
Download this now


Native, Web or Hybrid Mobile-App Development
By Certus Solutions | 2/11/2012
Choosing a development approach for mobile applications entails many parametres. Find the best approach to suit your enterprise needs. Read more.
Download this now
Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia