White Papers

Featured White Papers



It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management
By Skybox Security | 10/7/2017

Your approach to vulnerability management may be putting your organisation at greater risk. Just dealing with vulnerabilities that a vendor said were “critical” isn’t enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low–hanging fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn’t be tagged as a high priority in a purely vulnerability–centric approach.

Download this now


Accelerate time to business value with HPE Synergy and HPE Pointnext
By HPE | 1/9/2017

The digital economy—today and into the future

Today’s enterprises are experiencing increasing pressures that are disrupting their traditional business model. If customers do not address these pressures and evolve, they may risk the loss of market share, revenue, decreased stock prices, and more.

Download this now


CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRhythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now


Vulnerability and threat intelligence feed for accurate prioritisation and fast migration
By Skybox Security | 10/7/2017

To deploy resources in the right place, in the right way, vulnerability management teams need to know the intersection of vulnerabilities, network context and the threat landscape.

Download this now


2017 Vulnerability Management Survey Report
By Rapid7 | 2/6/2017

Vulnerability management still wanting as Australian businesses struggle to stay ahead of security risks. Australian businesses are still suffering from deficient vulnerability scanning practices, according to new survey data suggesting the industry is shifting away from implementing specific technologies and towards broader capabilities including cloud security and incident detection and response.

Download this now

Market Place