Corporate Partners

Security Whitepapers


Sort by: Date | Company | Title


The state of application delivery in 2015 report
By F5 Networks | 17/4/2015
F5 surveyed customers from more than 300 organisations across a broad spectrum of vertical markets such as banking and finance, telecommunications, public sector, and consumer products.
Download this now


Threat intelligence: Shellshock
By F5 Networks | 17/4/2015
Information on the security threat “Shellshock” and its mitigation.
Download this now


An evolving threat needs and evolved defense
By F5 Networks | 17/4/2015
Secure your business from today's sophisticated attacks.
Download this now


Access federation
By F5 Networks | 17/4/2015
Safely adopt cloud services without sacrificing security.
Download this now


Before the breach
By IBM Australia | 26/3/2015
Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be--offering the insight necessary to develop a proactive stance and thwart attackers.
Download this now


Best practice security in a cloud-enabled world
By IBM Australia | 26/3/2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realised, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Download this now


Defending against increasingly sophisticated DDoS attacks
By IBM Australia | 26/3/2015
This white paper provides insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Download this now


Security services : Interactive reference guide
By IBM Australia | 26/3/2015
Interactive reference guide for Security services wins/references.
Download this now


Engagement guide to MSS
By IBM Australia | 26/3/2015
Use this interactive service profile, which includes detailed information on how Managed Security Services are implemented in the client environment, to help prospects make a buying decision.
Download this now


2014 Selecting a Managed Security Services Provider: Top 10 criteria
By IBM Australia | 26/3/2015
Share this IBM Security Services white paper with your clients to help them outline a strategic approach to selecting an MSSP and establishes the 10 most important qualifications to consider in choosing a provider. The right MSSP can reduce the cost and complexity of information security while building a stronger security posture.
Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place