IT Security Whitepapers


Sort by: Date | Company | Title


The Threat Lifecycle Management Framework
By LogRythm | 10/5/2017

Prevent major data breaches by reducing time to detect and respond to threats.

You can lessen your organisation's risk of experiencing a damaging cyber incident or data breach by investing in effective Threat Lifecycle Management. Although internal and external threats will exist, the key to managing their impact within your environment and reducing the likelihood of costly consequences is through faster detection and response capabilities.

Download this now


CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now


Infographic: INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY
By Dell Secureworks | 12/9/2016

It may have taken years, but greater executive involvement in IT security strategy is putting real weight behind the transformation that is seeing Australian businesses revisit their security practices and the escalation of authority behind crucial security initiatives. The CSO-Dell Secureworks IT Security Strategy Survey 2016 highlighted the extent of this transformational trend, with an almost even split between the number of companies where security executives report to the CIO and those that report to other business executives.

Download this now


INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY: TOP TIPS
By Dell Secureworks | 12/9/2016

INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY: TOP TIPS

Download this now


INSIGHTS: THE 2016 AUSTRALIAN IT SECURITY STRATEGIES SURVEY
By Dell Secureworks | 12/9/2016

T here is nothing new about arguments that information security should be recognised as a high-level concern – and handled at the highest levels of the organisation. However, according to the recent CSO-Dell Secureworks IT Security Strategy Survey 2016, Australian businesses are making great strides towards making this happen.

Download this now


Improving Your Organisation's Security
By NTT Australia | 2/5/2016

The NTT Group’s 2016 Global Threat Intelligence report found that 77% of organisations did not know how to recover from a security incident. You can reduce the cost of security incidents by 80% or more by being prepared.

In this e-book, you’ll discover: • Latest security trends in Australia • Some of the significant threats you may be exposed to • Practical advice on how you can improve your security operations and reduce your threat profile, from managing vulnerabilities to proactive monitoring.

Download this now


Securing DNS to Thwart Advanced Targeted Attacks and Reduce Data Breaches
By Infoblox | 4/8/2015

This paper looks at the basics of DNS services, how they can be compromised, how to secure them more effectively and how an organization can actually use them as an asset to improve its security posture.

Download this now


New technology adoption is pushing enterprise networks to the breaking point
By IBM Australia | 15/6/2015

This infographic looks at pressures on enterprise networks as demand and deployment rates for cloud, big data and analytics, mobile, social as IT security capabilities sky-rocket.

Download this now


Redefining networks for cloud, analytics, mobile, social and security
By IBM Australia | 15/6/2015

Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.

Download this now