White Papers: security




Sort by: Date | Company | Title


Building a Better Mousetrap in Anti-Malware
By Webroot | 24/8/2012
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Download this now


Case Study: Gadens Law Firm Reclaims 22 Hours of Lost Productivity Each Month
By Webroot | 24/8/2012
For the past eight years, Gadens Brisbane has used a “big three” security vendor to protect its network against malware and other threats. Despite deploying a complete antivirus package, the firm still experienced up to three infections across the network every week. This gap in security meant the firm’s IT team was spending up to six hours a week on security management, resulting in lawyers being unable to work on their computers for hours a time – an inconvenience for the individual, and costly for a business reliant on hourly charging. Read how Gadens Law Firm have reduced their security management time from about 6 hours a week to 30 minutes a week.
Download this now


Clearswift SECURE Email Gateway Evaluation Guide
By Clearswift | 17/8/2012
This is a guide that allows a user to evaluate their Clearswift SECURE Web Gateway experience. The guide explores and explains some of the many benefits to the Clearswift SECURE Web Gateway.
Download this now


Clearswift SECURE Web Gateway Evaluation Guide
By Clearswift | 17/8/2012
This is a guide that allows a user to evaluate their Clearswift SECURE Email Gateway experience. The guide explores and explains some of the many benefits to the Clearswift SECURE Email Gateway.
Download this now


Virtualisation Solution Brief
By Clearswift | 16/8/2012
Clearswift’s SECURE Web and Email gateway security solutions are designed to accelerate the returns on your virtualisation strategy. Our award-‐winning web and email solutions consolidate existing multiple point security products and vendors into unified web and email solutions. Read more.
Download this now


Improve Route Accounting and DSD Cost-Effectiveness with Mobility Technology
By Zebra Technologies | 9/8/2012
Automating DSD operations is a proven practice to help solve problems and gain the ensuing productivity and profitability benefits. Mobile computing applications can help prevent order-entry errors and assist DSD staff in managing inventory more accurately and efficiently. This white paper discusses key considerations when selecting mobility solutions, and unveils how mobility-enabled operations can improve route accounting and DSD efficiency, reduce operating expenses, and boost customer satisfaction.
Download this now


Deploying Equipment Offsite in Co-Location Sites or the Cloud
By APC | 18/7/2012
With the ease of adopting cloud computing, it is inevitable that some data and applications will eventually move there. Cloud providers offer many options for moving and storing data in the cloud, and often provide service level strategies well beyond the financial capabilities of small and medium businesses. Read more.
Download this now


Maximising productivity without sacrificing security
By Dell | 6/7/2012
Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to information. As these trends extend from the home into the work place, IT managers should consider seriously the opportunities for increased productivity and communication with customers and constituents, as well as understand the increased security risks posed by online, anytime access to private networks and data. Read more.
Download this now


Virtualisation and Cloud Computing: Optimised Power, Cooling, and Management Maximises Benefits
By APC | 3/7/2012
Virtualisation has become the very technology engine behind cloud computing itself, while the benefits of this technology and service delivery model are well known, understood, and increasingly being taken advantage of, their effects on the data center physical infrastructure are less understood. The purpose of this paper is to describe these effects while offering possible solutions or methods for dealing with them.
Download this now


FireEye Advanced Threat Report – 2H 2011
By FireEye | 3/7/2012
The FireEye Advanced Threat Report for the second half of 2011 is based on research and trend analysis conducted by the FireEye Malware Intelligence Labs. This report provides an overview of advanced targeted attacks in the second half of 2011 and was developed to provide insights into the current threat landscape, evolving advanced persistent threat (APT) tactics, and the level of infiltration seen in organisational networks today. This is not a typical threat report with just tallies of the millions of well-known malware or billions of spam messages. Read more.
Download this now
Sign up now to get free exclusive access to reports, research and invitation only events.
Featured Download
/downloads/product/58/seamonkey/

Seamonkey

Seamonkey includes an Internet browser, email and newsgroup client with an included web feed reader, HTML editor, IRC chat and web development tools. SeaMonkey will ...

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia