Resources & Whitepapers

Listed below is a selection of technical whitepapers and other advisory notices produced by iTnews' sponsors.

These reports are available free of charge to our subscribers.

Filter by company:

The risky business of open source

The risky business of open source

Learn about the results of analysis of 351,000 external libraries found in 85,000 applications.
Jan 13 2021 5:55PM
Mitigating open source risk in your organisation

Mitigating open source risk in your organisation

Build a framework for prioritising open source application security.
Jan 12 2021 5:46PM
How to choose a WAF that's right for you

How to choose a WAF that's right for you

Stop the bots. Download this F5 guide to web application firewalls
Dec 15 2020 5:29PM
The global telco 5G cloud gaming opportunity

The global telco 5G cloud gaming opportunity

Learn about the potential for cloud gaming and the opportunity for fixed and mobile carriers.
Dec 8 2020 3:07PM
Building a ransomware remediation backup strategy

Building a ransomware remediation backup strategy

This IDC InfoBrief looks at ANZ organisations' experiences in recovering from ransomware attacks, and best practices.
Nov 18 2020 11:28AM
Forrester's Asia Pacific Predictions 2021 Guide

Forrester's Asia Pacific Predictions 2021 Guide

Download Forrester’s complimentary Asia Pacific Predictions 2021 Guide to help you and your organisation capitalise on the forecasted dynamics and gain a competitive edge in 2021.
Oct 28 2020 9:20AM
Adopting a Next-Generation Data Security Approach

Adopting a Next-Generation Data Security Approach

Read the IDC whitepaper and learn how to adopt a next generation data security strategy that accounts for the rise in hybrid multicloud adoption.
Oct 22 2020 2:50PM
How to be a SOAR winner

How to be a SOAR winner

Eight successful strategies to unlocking more value from your security orchestration, automation and response (SOAR) platform
Oct 22 2020 2:43PM
3 steps to a well-rounded cybersecurity plan

3 steps to a well-rounded cybersecurity plan

Learn the three key steps to a well-rounded cybersecurity plan and how to achieve them with limited resources.
Oct 18 2020 3:33PM
Learn IT Service Management (ITSM) best practises

Learn IT Service Management (ITSM) best practises

Automating IT Service Management (ITSM) can help IT teams support employees through future crises. Learn more.
Oct 18 2020 3:24PM
A Migration Guide For Businesses Switching Mobile Device Management Solutions

A Migration Guide For Businesses Switching Mobile Device Management Solutions

Let this info brief act as a roadmap guiding your plans for a migration of your devices into Jamf, and know we are here to help along the way.
Sep 1 2020 1:49PM
Plan your post-COVID security strategy

Plan your post-COVID security strategy

Long-term issues for security managers
Aug 27 2020 11:24AM
The Executive's Guide To The Future Of Work

The Executive's Guide To The Future Of Work

Download Forrester’s complimentary guide and self-assessment tool to help you identify the strengths and challenges within your organisation, and detect where you can improve your workforce strategy that addresses the future of work today.
Aug 25 2020 11:47AM
Government Digital Transformation Requires Customer Obsession

Government Digital Transformation Requires Customer Obsession

Government agencies can accelerate digital transformation and achieve mission success by implementing a customer-obsessed operating model. Download the Forrester guide to learn more now!
Aug 5 2020 2:26PM
Master the fundamentals of AWS cost efficiency

Master the fundamentals of AWS cost efficiency

Are you using the right procurement and financial processes to manage AWS spending? Learn how.
Jul 20 2020 5:38PM
Get IT, finance and business on the same page

Get IT, finance and business on the same page

Getting agreement on IT costs is no easy task. Make it easier by downloading Apptio's introduction to its standard IT cost model.
Jun 17 2020 11:55AM
Why is DevSecOps important to your business?

Why is DevSecOps important to your business?

Download the free eBook to find out
May 26 2020 3:05PM
Architecting Hybrid IT & Edge for Digital Advantage

Architecting Hybrid IT & Edge for Digital Advantage

The enterprise network must evolve for the new era of hybrid IT. In order to meet new digital demands, enterprises increasingly rely on IT that is housed outside of the traditional datacenter, whether that means using a public cloud, a hosted private cloud, a SaaS provider – or edge computing.
May 26 2020 2:15PM
Organizations Increasing Their Adoption of NFV

Organizations Increasing Their Adoption of NFV

IT infrastructure has become more complex than ever, especially when it comes to networking and the reality of highly distributed infrastructures. That’s why many enterprises are turning to network functions virtualization (NFV). This paper provides insight on the state of NFV adoption and offers a specific approach to optimizing the benefits of the technology.
May 26 2020 2:10PM
Modernise IT by Reducing Your Reliance on AD

Modernise IT by Reducing Your Reliance on AD

The cloud evolution and "work from anywhere, anytime" policies have caused organisations to rethink identity, authentication, security, and access. This whitepaper outlines why AD is no longer the right choice in a cloud-first world, and how you can start to lessen your workload by reducing reliance on AD
May 6 2020 2:05PM

Log In

Username / Email:
Password:
  |  Forgot your password?