Security Whitepapers


Sort by: Date | Company | Title


Security Analytics: The Cornerstone Of Modern Detection And Response
By RSA | 5/2/2016

Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. Given the proliferation and sophistication of malicious entities, organizations must assume that they will be infiltrated and have an effective detection and response strategy. In this report Forrester Consulting evaluates how the capabilities of SIEM and security analytics solutions stack up against the current threat landscape.

Download this now


Vendors Enhance Threat Mitigation And Cloud Capabilities
By CA Pacific | 3/2/2016

Forrester Wave Report for Privileged Identity Management provides a thorough evaluation of all the vendors offering Privileged Management solutions. Today’s economic environment is forcing S&R professionals to consider alternatives to on-premises solutions and use cloud services. Leaders in the PIM space now offer cloud support, threat mitigation to prevent data breaches, and privileged identity intelligence.

Download this now


Security Executive Brief: Best Practices and a Maturity Model for Securing Privileged Identities
By CA Pacific | 3/2/2016

This guide provides 22 specific actions that you can take to more effectively control privileged user accounts and access across your organisation in the context of a maturity model.

Download this now


eBook: Defending Against Insider Threats in the “Snowden Era”
By CA Pacific | 3/2/2016

Insider threats and data breaches are becoming more and more common and the stakes have never been higher. This ebook details the strategies and best practices for defending against insider threats that can lead to significant data breaches.

Download this now


Micro-segmentation for Dummies eBook
By VMware Australia | 2/2/2016

This eBook provides a broad overview of micro-segmentation in the data centre. After reading this , you’ll have a good basic understanding of micro-segmentation — like you’d get from a college-level 101 class, but far more interesting than Microbiology 101 or Microeconomics 101 (and not as difficult either)!

Download this now


Leveraging micro-segmentation to build a zero trust network
By VMware Australia | 29/1/2016

This whitepaper looks at the security gaps and disconnects in organisations, how network virtualisation can help to reduce risk and support a higher-level security strategy and why micro-segmentation provided through network virtualisation paves the way for implementing a Zero Trust model.

Download this now


Connect and protect: Building a trust-based Internet of Things for business-critical applications
By Aruba Wireless Networks | 18/1/2016

As IoT has grown in size and complexity, mechanisms to ensure security haven't kept pace and is often managed with an operation focus.Find out how organisations can bring order and trust to unsecured devices that make up IoT and how exploiting IoT data can be executed without incurring risk.

Download this now


Unlocking the power of Flash Storage
By NTT Australia | 15/12/2015

Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.

Download this now


Australian security executives quietly concerned about endpoint protection strategy
By Webroot | 29/10/2015

Endpoint security has been recognised by most companies as being a crucial component of corporate defence against security breaches. Find out why despite being confident in their existing protection strategy, most Australian companies have acknowledged there is still room for improvement.

Download this now


What solutions are Australian companies using to secure network endpoints?
By Webroot | 29/10/2015

Almost 50% of Australian security executives are concerned about the current state of their company’s security in dealing with advanced attacks. Find out in this infographic the survey results of how respondents feel about dealing with security breaches effectively.

Download this now