Resources & Whitepapers

Listed below is a selection of technical whitepapers and other advisory notices produced by iTnews' sponsors.

These reports are available free of charge to our subscribers.

Filter by company:

Who owns the data?

Who owns the data?

An eBook on data stewardship, sponsored by Splunk.
Feb 5 2014 10:24AM
SafeNet Encryption & Key Management Survey Report

SafeNet Encryption & Key Management Survey Report

To gain a better picture of how organisations are contending with the evolving threat landscape, SafeNet undertook an extensive survey of the readers of Secure Computing Australia.
Feb 4 2014 4:41PM
How to build business services

How to build business services

Australian IT organisations are under pressure to store every piece of data generated in the workplace in perpetuity, and to simultaneously provide richer, user-friendly access to it, all while keeping the data safe and secure.
Jan 24 2014 2:00PM
Whitepaper: The Threat Landscape

Whitepaper: The Threat Landscape

A practical guide prepared by Kaspersky Lab.
Dec 10 2013 10:41AM
Whitepaper: Security and compliance on Amazon Web Services

Whitepaper: Security and compliance on Amazon Web Services

A best practice guide published by Trend Micro.
Nov 20 2013 1:56PM
Datasheet: Deep Security for Amazon Web Services

Datasheet: Deep Security for Amazon Web Services

Trend Micro's solution for cloud security.
Nov 20 2013 12:26PM
Whitepaper: Context Based Authentication

Whitepaper: Context Based Authentication

Convenient, cost-effective secure remote access
Nov 13 2013 5:30PM
Whitepaper: Sourcefire Reports and Case Studies in Australia & New Zealand

Whitepaper: Sourcefire Reports and Case Studies in Australia & New Zealand

If you knew you were going to be hacked, would you do security differently?
Nov 8 2013 12:47PM
Whitepaper: Sourcefire Visibility & Control eBook

Whitepaper: Sourcefire Visibility & Control eBook

The world is split into two groups: those who have been hacked and those who will be
Nov 8 2013 12:18PM
Whitepaper: Buying Criteria for Advanced Malware Protection

Whitepaper: Buying Criteria for Advanced Malware Protection

Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and after an attack
Nov 8 2013 12:09PM
25 Years of Vulnerabilities: Research Report

25 Years of Vulnerabilities: Research Report

With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
Nov 8 2013 11:56AM
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies

Whitepaper: Implementing DSD's Top 35 Mitigation Strategies

It is no longer an option to be complacent about securing our computer networks
Nov 8 2013 11:16AM
Whitepaper: Next-Generation Authentication - Balancing Security and Convenience

Whitepaper: Next-Generation Authentication - Balancing Security and Convenience

The demands for heightened security through the use of multi-factor authentication are pressing.
Nov 6 2013 3:15PM
SafeNet - Next-Generation Authentication

SafeNet - Next-Generation Authentication

Fast track your way to strong authentication
Nov 6 2013 3:14PM
Insights into risk management roundtable eBook

Insights into risk management roundtable eBook

Read this free eBook to help you unravel the diverse and dynamic realm that is risk.
Oct 21 2013 11:38AM
Whitepaper: Zscaler and the Direct-to-Cloud network

Whitepaper: Zscaler and the Direct-to-Cloud network

Some 80 percent of corporate traffic is internet bound.
Oct 16 2013 11:39PM
Whitepaper: Trend Micro's 10 step APT action plan

Whitepaper: Trend Micro's 10 step APT action plan

Reconsider your current situational awareness, level of preparation and operative ability.
Oct 16 2013 11:28PM
Whitepaper: Websense on how threat monitoring builds fast responses to security incidents

Whitepaper: Websense on how threat monitoring builds fast responses to security incidents

Traditional security defense technologies only protect against 30–50 percent of today’s threats.
Oct 16 2013 11:20PM
Big Security for Big Data

Big Security for Big Data

Big security for big data We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data. It is because information is so pervasive that businesses want to capture this data and analyze it for intelligence.
Oct 16 2013 11:45AM
The True Cost of BYOD

The True Cost of BYOD

Crunching the numbers on enterprise mobility.
Sep 25 2013 1:30AM

Log In

  |  Forgot your password?