Security Whitepapers


Sort by: Date | Company | Title


Advanced endpoint protection for dummies
By Palo Alto Networks | 26/10/2015

Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged.

Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.

Download this now


The definitive guide for evaluating cybersecurity solutions
By Palo Alto Networks | 26/10/2015

Cyber criminals today are deploying sophisticated attacks on enterprises making the role of security professionals much more complex than ever before. Find out the 10 requirements your cybersecurity solution must meet to ensure secure application enablement at every location and how you should widen your RFP selection criteria when choosing a security provider.

Download this now


The rising tide of DNS threats
By Infoblox | 19/10/2015

The dramatic increase in DNS and DDoS attacks in the past five years has resulted in loss of business revenue and brand equity for many companies. This infographic gives insights on the effects of these increasing attacks and looks at industries that are most commonly affected by these threats.

Download this now


Designing a secure DNS architecture
By Infoblox | 19/10/2015

With globalisation growing, an inefficient DNS system that fails to support the influx of online visitors can be detrimental to business operations, revenue and online reputation. Find out what you must know to design a scalable and secure DNS architecture that not only satisfies your current business needs but also takes into account future expansion plans.

Download this now


2015 Remote support trends
By LogMeIn | 13/10/2015

Remote support solutions today comprises more than remote control for PCs. With globalisation of companies, the workforce is now more mobile than ever which translates to an increased variety of devices being used.

This whitepaper looks at results from a 2015 survey showing trends of this market, showing more than 70% of surveyed businesses are adopting a remote support solution and nearly 50% have allocated budgets for this purpose in the next financial year.

Download this now


Discover the workplace of the future, today
By Readify | 30/9/2015

Cloud, identity management and enterprise mobility technologies can provide significant benefits for business efficiency and promote a collaborative workforce. However, it can often result in conflicts of interests between business heads and IT leaders, both who have different concerns and expectations on how to implement these solutions to benefit the company.

This whitepaper looks at how a collaborative approach can benefit both IT and business stakeholders, resulting in increased business flexibility and security. Included in this whitepaper are also 5 step by step considerations for both business and IT leaders to reap the benefits of these platforms by adopting synergistic strategies.

Download this now


Security in a world with no perimeters
By Logicalis & Cisco | 4/9/2015

This practical “how to” guide looks at the fundamentals of securing an enterprise, when the traditional concept of having a perimeter to defend is rapidly losing all relevance. As well as proposing a flexible business-centric security architecture that takes a new approach to securing the enterprise, this guide takes a practical process that applies to organisations of any size.

Download this now


High availability is not a luxury
By Arcserve | 31/8/2015

When markets are global, employees work around the clock and business is effectively always on, any interruption to application availability can quickly lead to lost revenue, lost productivity, lost brand value, and regulatory problems. Read on to learn how to deal with this type of existential threat.

Download this now


Securing remote vendor access with privileged account security
By CyberArk | 26/8/2015

Remote, external users accessing your network from third-party organisations introduce a risk that can be mitigated. This whitepaper looks at how organisations can minimise the risk of unauthorised users exploiting accounts by implementing a control strategy that still enables businesses to partner effectively with outside parties while maintaining the same security standards across the entire organisation.

Download this now


Scan your network with CyberArk
By CyberArk | 26/8/2015

Privileged accounts are the pathway to a company’s most valuable data and are therefore compromised in the majority of advanced and internal attacks. Find out how you can use CyberArk to scan your network and discover where privileged accounts exist, assess security risks, identify and collect reliable and comprehensive information.

Download this now
CIO
ARN
Techworld
CMO