Resources & Whitepapers

Listed below is a selection of technical whitepapers and other advisory notices produced by iTnews' sponsors.

These reports are available free of charge to our subscribers.

Filter by company:

Whitepaper: Context Based Authentication

Whitepaper: Context Based Authentication

Convenient, cost-effective secure remote access
Nov 13 2013 5:30PM
Whitepaper: Sourcefire Reports and Case Studies in Australia & New Zealand

Whitepaper: Sourcefire Reports and Case Studies in Australia & New Zealand

If you knew you were going to be hacked, would you do security differently?
Nov 8 2013 12:47PM
Whitepaper: Sourcefire Visibility & Control eBook

Whitepaper: Sourcefire Visibility & Control eBook

The world is split into two groups: those who have been hacked and those who will be
Nov 8 2013 12:18PM
Whitepaper: Buying Criteria for Advanced Malware Protection

Whitepaper: Buying Criteria for Advanced Malware Protection

Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and after an attack
Nov 8 2013 12:09PM
25 Years of Vulnerabilities: Research Report

25 Years of Vulnerabilities: Research Report

With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
Nov 8 2013 11:56AM
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies

Whitepaper: Implementing DSD's Top 35 Mitigation Strategies

It is no longer an option to be complacent about securing our computer networks
Nov 8 2013 11:16AM
Whitepaper: Next-Generation Authentication - Balancing Security and Convenience

Whitepaper: Next-Generation Authentication - Balancing Security and Convenience

The demands for heightened security through the use of multi-factor authentication are pressing.
Nov 6 2013 3:15PM
SafeNet - Next-Generation Authentication

SafeNet - Next-Generation Authentication

Fast track your way to strong authentication
Nov 6 2013 3:14PM
Insights into risk management roundtable eBook

Insights into risk management roundtable eBook

Read this free eBook to help you unravel the diverse and dynamic realm that is risk.
Oct 21 2013 11:38AM
Whitepaper: Zscaler and the Direct-to-Cloud network

Whitepaper: Zscaler and the Direct-to-Cloud network

Some 80 percent of corporate traffic is internet bound.
Oct 16 2013 11:39PM
Whitepaper: Trend Micro's 10 step APT action plan

Whitepaper: Trend Micro's 10 step APT action plan

Reconsider your current situational awareness, level of preparation and operative ability.
Oct 16 2013 11:28PM
Whitepaper: Websense on how threat monitoring builds fast responses to security incidents

Whitepaper: Websense on how threat monitoring builds fast responses to security incidents

Traditional security defense technologies only protect against 30–50 percent of today’s threats.
Oct 16 2013 11:20PM
Big Security for Big Data

Big Security for Big Data

Big security for big data We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data. It is because information is so pervasive that businesses want to capture this data and analyze it for intelligence.
Oct 16 2013 11:45AM
The True Cost of BYOD

The True Cost of BYOD

Crunching the numbers on enterprise mobility.
Sep 25 2013 1:30AM
Trigger point

Trigger point

Launching NBN Co’s plans for the enterprise.
Aug 22 2013 2:32PM
The Threat Within eBook

The Threat Within eBook

Read this guide to learn how you can mitigate the risk of insider threats.
Jul 4 2013 11:06AM
SC Award Winners eBook 2013

SC Award Winners eBook 2013

Read this summary report to find out which vendors came out on top in the 2013 SC Awards, held at the annual Auscert conference.
Jun 28 2013 3:49PM
Data Breach Notification Roundtable eBook

Data Breach Notification Roundtable eBook

Read this guide to learn how you should prepare for mandatory data breach notification.
May 14 2013 1:59PM
Inside SIEM Roundtable eBook

Inside SIEM Roundtable eBook

Security Information and Event Management (SIEM) can be a rocky road. Of those organisations which have embarked on SIEM deployments, some have suffered false starts while others have failed to fully implement the technology.
May 14 2013 1:49PM

Log In

  |  Forgot your password?