Security Whitepapers

Sort by: Date | Company | Title

Guide to Electronic Signatures
By eSign by Vasco | 12/9/2017

The trend to digitise and transform business is accelerating. Government and business leaders, analysts and industry associations agree: it is time to remove paper from everyday processes like contracting, HR, invoicing and transactions with customers and citizens. As a result, the traditional way of signing documents is changing – from paper to paperless.

Download this now

The Security Challenge for SMBs in a Mobile World
By Microsoft | 7/9/2017

There’s a big change happening in how small and medium-sized businesses (SMBs) think about IT security as they take advantage of mobility and the cloud. They’re recognising the need for mobile device management (MDM), cloud security, and the importance of choosing the right devices.

In this paper, we’ll consider why blending on-site security with MDM will give you a more flexible and scalable way to secure your mobile devices, data, and user identities. We’ll also outline some key considerations when investing in new mobile devices, so your business gets the full benefits of the latest trends in IT. Plus, we’ll explore some typical workplace scenarios to show how this results in practical benefits for your people and your business.

Download this now

CSO Security Buyers Guide 2017
By CSO | 11/8/2017

The pressure is on to be secure. Are you feeling the squeeze?

If you spent the past few years coming to grips with the true extent of the threat from malware, ransomware and nation-state hackers, be prepared for the rest of 2017 to play out rather differently. Sure, the threats are still there and growing but as Australia prepares to join the ranks of the nations with mandatory breach reporting regimes, you are now operating under the microscope and on a deadline.

Download this now

How to make your business more secure using Dell & Windows 10
By Dell | 4/8/2017

Effectively securing your enterprise is a continuous effort that requires constant attention and improvements. Rapid technological change can resolve business problems and pave the way towards digital transformation, but it also creates new points of potential vulnerability – which can create new security problems that interrupt or disable the business.

Download this now

8 Things CIOs Need to know about Whaling
By Mimecast | 16/6/2017

Security is an ever-evolving threat landscape. Even with the best in-breed security systems, there is still a possibility that your company is at risk. This whitepaper covers the 8 important things CIOs need to know about whaling and some useful tips they can use to protect their organisation from being held ransom to such attacks.

Download this now

The Threat Lifecycle Management Framework
By LogRhythm | 10/5/2017

Prevent major data breaches by reducing time to detect and respond to threats.

You can lessen your organisation's risk of experiencing a damaging cyber incident or data breach by investing in effective Threat Lifecycle Management. Although internal and external threats will exist, the key to managing their impact within your environment and reducing the likelihood of costly consequences is through faster detection and response capabilities.

Download this now

CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRhythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now

Status Quo Creates Security Risk: The State of Incident Response
By ServiceNow | 22/3/2017

This research project was undertaken in order to evaluate the current practices and challenges associated with incident response processes and technologies. Respondents were also asked to provide details on their organisations’ future strategic plans intended for improving the efficacy and efficiency of IR activities.

Download this now

A Practical Guide to Efficient Security Response
By ServiceNow | 22/3/2017

Data breaches constantly threaten the modern enterprise. And the risk continues to grow: In 2015, the total number of identities exposed via data breaches increased 23%, to 429 million. Time-to-compromise is now measured in minutes, and data exfiltration happens in days.

Worse still, detecting a breach can take months, with a median of 201 days to discovery. Unable to quickly respond, organisations risk exposing valuable data and confidential information. The recovery process can be incredibly expensive and the damage to the business reputation incalculable.

Download this now

5 Key Considerations for Effective Security in a Mobile World
By Dilignet | 16/3/2017

The way in which people work has changed. The mobile workforce is a reality. Yet while new ways of working bring many benefits, they demand a new approach to security.

For instance, how do you secure your data and applications on the internet? What happens if a device gets stolen? How do you ensure documents are secure if they are used in public environments? Can you provide quality technical support to users who are working from home? How will your employees ensure that their work and private information remains separate?

Read this whitepaper to find out more.

Download this now