White Papers

Featured White Papers



The cost of cloud expertise
By Rackspace | 24/10/2017

Complimentary Cost of Cloud Study highlighting: The true cost of cloud expertise; recruiting to unlock the cloud's potential; keeping pace with the speed of cloud change; return on cloud investment, and more

Download this now


Using security metrics to drive action in ASIA Pacific
By Tenable Network Security | 8/5/2017

22 Experts Share How to Communicate Security Program Effectiveness to Upper Management.

Today’s cybersecurity challenges are more complex than ever before. Technologies like Development Containers, Cloud, BYOD, and BYOA have greatly complicated the security team’s ability to understand all of the potential IT attack surface.

We hope you find this e-book useful in helping you develop and communicate security metrics in your own organization.

Download this now


The Mimecast email security risk assessment
By Mimecast | 18/8/2017

Many organizations think their current email security systems are up to the task of protecting them. Unfortunately many email security systems fall short and do not keep their organisations safe. The reality is the entire industry needs to work toward a higher standard of quality, protection and overall email security. The proof is in the numbers, and Mimecast is establishing a standard of transparency for organisations and raising the bar for all security vendors.

Download this now


Human Factor Report 2017
By Proofpoint Pty Ltd | 19/10/2017

The headline stories of the threat landscape in 2016 were of the explosive growth of ransomware, the massive email campaigns that distributed it to organisations of all sizes, and the exponential increase in email fraud attacks that have cost businesses billions in theft, disruption and reputational damage. Criminals are now targeting individuals, not companies or infrastructure. See key findings from our Human Factor Report.

Download this now


Business Email Compromise Survival e-Guide
By Proofpoint Pty Ltd | 19/10/2017

Business email compromise (BEC), or impostor email, doesn't use malware attachments or malicious URLs, making it invisible to even "next-generation" email defenses. Safeguard your critical information and secure all the avenues that BEC attackers pursue.

This BEC Survival Guide can help you: Understand how BEC works and why it succeeds Prepare for and prevent attacks Know what to look for in a complete solution that stops BEC and other targeted threats Download your copy now and start building your BEC defenses.

Download this now

Market Place