Security Whitepapers


Sort by: Date | Company | Title


Cloud services provisioned outside of IT control can spell trouble
By Tangoe | 20/4/2015
Cloud applications and services are woven into the very fabric of most organisations, yet the vast majority underestimate the number of cloud deployments in their organisation. This report looks at how you can achieve success by harnessing the ability to identify, centralise, and streamline corporate cloud deployments.
Download this now


Practical operations and security guidelines for adopting cloud technology
By SDL | 20/4/2015
In this paper is focused on cloud operations and security, providing insights and tips so you can assess the quality of a vendor’s cloud offering. Read: why not all cloud providers meet the same standards when it comes to security and privacy, which topics you must investigate to ensure you choose the right vendor, and why no single check-list could work for every possible scenario.
Download this now


The state of application delivery in 2015 report
By F5 Networks | 17/4/2015
F5 surveyed customers from more than 300 organisations across a broad spectrum of vertical markets such as banking and finance, telecommunications, public sector, and consumer products.
Download this now


Threat intelligence: Shellshock
By F5 Networks | 17/4/2015
Information on the security threat “Shellshock” and its mitigation.
Download this now


An evolving threat needs and evolved defense
By F5 Networks | 17/4/2015
Secure your business from today's sophisticated attacks.
Download this now


Access federation
By F5 Networks | 17/4/2015
Safely adopt cloud services without sacrificing security.
Download this now


Before the breach
By IBM Australia | 26/3/2015
Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.
Download this now


Best practice security in a cloud-enabled world
By IBM Australia | 26/3/2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realised, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Download this now


Defending against increasingly sophisticated DDoS attacks
By IBM Australia | 26/3/2015
This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Download this now


Security services : Interactive reference guide
By IBM Australia | 26/3/2015
Interactive reference guide for Security services wins/references.
Download this now