Security Whitepapers


Sort by: Date | Company | Title


2014 IBM X-Force Threat Intelligence Report 4Q 2014
By IBM Australia | 26/3/2015
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
Download this now


2014 IBM Cyber Security Intelligence Index report
By IBM Australia | 26/3/2015
The annual Cyber Security Intelligence Index report offers a high-level overview of the major threats trending across businesses worldwide over the past year.
Download this now


2014 Ponemon Cost of data breach study
By IBM Australia | 26/3/2015
IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn.
Download this now


2014 IBM Chief Information Security Officer Assessment
By IBM Australia | 26/3/2015
The 2014 edition of the CISO Assessment evaluates the current state of security leadership and what leaders expect to face in the next three to five years. Security leaders are in the midst of an evolution.
Download this now


Massively Scalable, Intrinsically Simple: The Virtualised Data Center
By Tintri | 9/3/2015
This Field Report validates our impressive lab findings with feedback from the field: six customers who have Tintri storage in production environments. While each customer has a unique own story to tell, we found that everyone documented a compelling value proposition based on TCO factors. Throughout our research we found that Tintri’s approach provides significantly lower TCO than traditional storage solutions. Here is a quick review of some of the most significant items in light of what we've just heard.
Download this now


Cyber Security Guide - 10 Steps to a More Secure Business
By Check Point Software Technologies | 9/3/2015
Just as we’ve learned to tune out car alarms, so have we become impervious to the headlines of cybercrime. That’s despite cybercriminals stealing over 500 million identities1 in 2014, alone. According to a December 2014 Computer Weekly article2, “The production of malware continues on an industrial scale, with exploit kits and malware services putting sophisticated attack methods in the hands of relatively unskilled cyber criminals.” And unfortunately, ignoring the issue will not make it go away.
Download this now


Security Strategies for Success
By Citrix Systems Asia Pacific | 12/1/2015
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for: • Leading meaningful security discussions with the board of directors • Engaging end users to protect business information • Meeting security-related compliance requirements
Download this now


Solve the application visibility challenge
By Citrix Systems Asia Pacific | 12/1/2015
This report demonstrates how enterprises can leverage their existing footprint of market-leading application delivery controllers for both instrumentation and policy enforcement. · The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential · The challenge of establishing an effective application visibility and control function is only growing as tech trends become more widespread · A next-generation application visibility solution can efficiently and economically deliver unprecedented insight into virtual desktops, mobile and cloud services
Download this now


A foundation for next-generation data centre security
By Citrix Systems Asia Pacific | 12/1/2015
This whitepaper discusses the need for an application delivery controller that addresses new and traditional challenges present in highly dynamic enterprise cloud architecture. · The ever-present budgetary pressures to do more with less means the foundation for stronger security must be built using existing data centre infrastructure · One particular ADC delivers an extensive portfolio of essential data centre security capabilities · The net result is a strong foundation for next-generation data centre security that is also cost effective
Download this now


Solve the application visibility challenge with NetScaler Insight Centre
By Citrix Systems Asia Pacific | 12/1/2015
The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience, but there are challenges to doing this effectively. •The challenge of establishing an effective application visibility and control function is only growing •The primary factor in the visibility challenge is a lack of correlation of the network to applications •Combining and streamlining these two factors will help troubleshoot existing performance problems and avoid future ones
Download this now