Security Whitepapers


Sort by: Date | Company | Title


Are you getting the most from your hybrid IT environment?
By IBM Australia | 15/6/2015
This infographic looks at how to organisations are overcoming the challenges associated with hybrid computing and summarizes the results found in the research paper “Optimized Sourcing in Hybrid Environments.”
Download this now


New technology adoption is pushing enterprise networks to the breaking point
By IBM Australia | 15/6/2015
This infographic looks at pressures on enterprise networks as demand and deployment rates for cloud, big data and analytics, mobile, social as IT security capabilities sky-rocket.
Download this now


Cloud services provisioned outside of IT control can spell trouble
By Tangoe | 20/4/2015
Cloud applications and services are woven into the very fabric of most organisations, yet the vast majority underestimate the number of cloud deployments in their organisation. This report looks at how you can achieve success by harnessing the ability to identify, centralise, and streamline corporate cloud deployments.
Download this now


Practical operations and security guidelines for adopting cloud technology
By SDL | 20/4/2015
In this paper is focused on cloud operations and security, providing insights and tips so you can assess the quality of a vendor’s cloud offering. Read: why not all cloud providers meet the same standards when it comes to security and privacy, which topics you must investigate to ensure you choose the right vendor, and why no single check-list could work for every possible scenario.
Download this now


The state of application delivery in 2015 report
By F5 Networks | 17/4/2015
F5 surveyed customers from more than 300 organisations across a broad spectrum of vertical markets such as banking and finance, telecommunications, public sector, and consumer products.
Download this now


Threat intelligence: Shellshock
By F5 Networks | 17/4/2015
Information on the security threat “Shellshock” and its mitigation.
Download this now


An evolving threat needs and evolved defense
By F5 Networks | 17/4/2015
Secure your business from today's sophisticated attacks.
Download this now


Access federation
By F5 Networks | 17/4/2015
Safely adopt cloud services without sacrificing security.
Download this now


Before the breach
By IBM Australia | 26/3/2015
Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.
Download this now


Best practice security in a cloud-enabled world
By IBM Australia | 26/3/2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realised, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Download this now