Security Whitepapers


Sort by: Date | Company | Title


Mobile Workspaces: Protect critical business information while embracing mobility
By Citrix Online | 15/10/2014
How does an IT organization craft a mobility strategy that improves productivity and flexibility for people who work from anywhere, while also meeting the ever-increasing security demands of the business?
Download this now


Symantec. 2014 Internet Security Threat Report
By Symantec | 14/10/2014
The 2014 Internet Security Threat Report highlights the developments in cyber-crime in the last year and provides an analysis in global threat activity. Highlights from the report are: • Hackers continuing to attack PCs, as well as mobile devices, security cameras, routers and more • The number of data breaches has risen 62% from 2013, identity breaches up 493% • Ransomware attacks rose 500% and have evolved into more vicious assaults
Download this now


Symantec Endpoint Protection™
By Symantec | 14/10/2014
Small business accounts for nearly a third of all malware attacks and is now the largest growing targeted group for cyber criminals. This datasheet discusses how you can protect yourself. Learn: • How you can keep protected out of the office and across all devices • Why it’s important to future-proof your security investment, and how to do it • Why your business is a bigger target than you thought
Download this now


Symantec Enterprise Vault.cloud™
By Symantec | 14/10/2014
Email has become one of the most critical information assets in a company. This datasheet gives insight to the importance of protecting your email and how you should approach putting a plan in place. Find out: • Why search capabilities are one of the most important factors in email storage management • The four requirements your email management system must have to be disaster proof • How cloud based email programs benefit organisations in accessibility and cost
Download this now


14 Tips for your Data Protection Plan
By Symantec | 14/10/2014
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
Download this now


Symantec Email Security.cloud™
By Symantec | 14/10/2014
Email is more than just a messaging platform; it’s also holds all your business’ critical information and can be a gateway for scams, viruses and malware. This datasheet covers the importance of managing email threats. • Why you need to be the gate-keeper of the email content entering and leaving your organisation • The importance of blocking malicious and inappropriate content before it reaches your network • How you can reduce risk and reduce cost in managing your email security
Download this now


Symantec Web Security.cloud™
By Symantec | 14/10/2014
Businesses have to adopt web usage policies to maximise productivity, limit data loss and minimise legal risks. This datasheet outlines how and why new approaches should be simplified for greater effectiveness. • Attackers are primarily using websites to deliver viruses and spyware, new approaches are needed • Why you need a modern integrated management tool to protect all your web based applications • How mutli-layer security and url filtering contributes to maximum safety
Download this now


Infographic: Phishing. Who’s being targeted?
By Symantec | 14/10/2014
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
Download this now


Data centre strategies for business growth in a hybrid cloud world
By Pacnet Australia | 14/10/2014
The data centre is now a strategic part of the hybrid cloud mix. This whitepaper discusses what you should know about the future of data centre and how to position your organisation for agility and growth. • Australia’s data centre market grew 17.2% to over $700 million in the last year. • Data centre engagement is often seen just as a commercial relationship, not a business relationship. • The 5 most important points CIOs need to consider before choosing a data centre
Download this now


Continous application availability with EMC VPLEX
By EMC Corporation | 8/9/2014
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
Download this now