Security Whitepapers


Sort by: Date | Company | Title


Implementing mobility/BYOD programs while maintaining regulatory compliance
By Dell | 19/6/2015
Organisations are readily launching BYOD programs to boost employee productivity and reduce costs. But this all comes at a risk and you maintain your vigilance in sustaining compliance with data security and privacy regulations. This whitepaper looks at several best practices are key for maintaining regulatory compliance with any BYOD program.
Download this now


Security intelligence: solving the puzzle for actionable insight
By LogRhythm | 16/6/2015
The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent. Rather, organisations should work on the principle that it is probable that they have already been breached. Traditionally, many security technologies have focussed on preventing threats from penetrating their networks, but, faced with increasingly sophisticated, well resourced, and businesslike attackers with the ability to target specific individuals and organisations with tailor-made exploits and to evade such defences, such tools are no longer sufficient. Prevention alone is not enough.
Download this now


LogRhythm and Symantec: Symantec Security Information Manager (SSIM) Migration Program
By LogRhythm | 16/6/2015
Following Symantec’s end-of-sale announcement for Symantec Security Information Manager (SSIM), customers are looking for alternative solutions to meet their SIEM needs. For customers that want or require an on-premise solution, LogRhythm has developed a simple and efficient migration path from SSIM to LogRhythm’s best-inclass Security Analytics and Intelligence Platform.
Download this now


Password Hygiene: a security mandate, not a best practice
By LogRhythm | 16/6/2015
This infographic looks at the findings from research capturing the password hygiene trends and how employees are placing organisations at risk.
Download this now


Surfacing critical cyber threats through security intelligence
By LogRhythm | 16/6/2015
As organizations evolve their Security Intelligence maturity, the realized reduction in MTTD and MTTR significantly reduces the risk of experiencing a damaging cyber incident. Of course, each organisation needs to assess for itself the appropriate level of maturity based on its own risk tolerances.
Download this now


The cyber threat risk - oversight guidance for CEOs and boards
By LogRhythm | 16/6/2015
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Download this now


With honeypots and threat intelligence ecosystems, LogRhythm expands capabilities
By LogRhythm | 16/6/2015
Security information and event management (SIEM) products provide a plethora of data that can be enriched to the nth degree. However, this data is of little value unless it can be converted into meaningful information that organizations can use to proactively detect and respond to threats in an acceptable timeframe.
Download this now


Are you getting the most from your hybrid IT environment?
By IBM Australia | 15/6/2015
This infographic looks at how to organisations are overcoming the challenges associated with hybrid computing and summarizes the results found in the research paper “Optimized Sourcing in Hybrid Environments.”
Download this now


New technology adoption is pushing enterprise networks to the breaking point
By IBM Australia | 15/6/2015
This infographic looks at pressures on enterprise networks as demand and deployment rates for cloud, big data and analytics, mobile, social as IT security capabilities sky-rocket.
Download this now
CIO
ARN
Techworld
CMO