Protection Whitepapers


Sort by: Date | Company | Title


Best practice security in a cloud-enabled world
By IBM Australia | 26/3/2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realised, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Download this now


Security services : Interactive reference guide
By IBM Australia | 26/3/2015
Interactive reference guide for Security services wins/references.
Download this now


Engagement guide to MSS
By IBM Australia | 26/3/2015
Use this interactive service profile, which includes detailed information on how Managed Security Services are implemented in the client environment, to help prospects make a buying decision.
Download this now


Gaining the upper hand in today's cyber security battle
By IBM Australia | 26/3/2015
Threat intelligence transforms the technical analysis required to identify the symptoms of a cyber attack - such as malware and security events - into an understanding of who the attackers are and what their motives and capabilities may be.
Download this now


The challenge of protecting critical data
By IBM Australia | 26/3/2015
The IBM Critical Protection for the Crown Jewels whitepaper helps enterprises understand how IBM can help them identify and protect their most critical business information over the full data life cycle - from acquisition to disposal.
Download this now


2014 IBM Chief Information Security Officer Assessment
By IBM Australia | 26/3/2015
The 2014 edition of the CISO Assessment evaluates the current state of security leadership and what leaders expect to face in the next three to five years. Security leaders are in the midst of an evolution.
Download this now


Security Strategies for Success
By Citrix Systems Asia Pacific | 12/1/2015
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for: • Leading meaningful security discussions with the board of directors • Engaging end users to protect business information • Meeting security-related compliance requirements
Download this now


Citrix NetScaler - A foundation of next-generation datacentre security
By Citrix Systems Asia Pacific | 12/1/2015
The need for robust data centre security has never been greater. This whitepaper looks at the traditional challenges and concerns as well as the new in the evolving requirements for security. •Traditional firewalls lack the visibility and control required to protect against the more the 70% of internet attacks •The capabilities of your data centre security should cover application, infrastructure, identity and security fabric •Mounting budget requirements means organisations look to do more with less
Download this now


Symantec Business Data Protection Kit
By Symantec | 24/10/2014
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
Download this now


14 Tips for your Data Protection Plan
By Symantec | 14/10/2014
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
Download this now