Corporate Partners

Security Whitepapers


Sort by: Date | Company | Title


Securing remote vendor access with privileged account security
By CyberArk | 26/8/2015
Remote, external users accessing your network from third-party organisations introduce a risk that can be mitigated. This whitepaper looks at how organisations can minimise the risk of unauthorised users exploiting accounts by implementing a control strategy that still enables businesses to partner effectively with outside parties while maintaining the same security standards across the entire organisation.
Download this now


Scan your network with CyberArk
By CyberArk | 26/8/2015
Privileged accounts are the pathway to a company’s most valuable data and are therefore compromised in the majority of advanced and internal attacks. Find out how you can use CyberArk to scan your network and discover where privileged accounts exist, assess security risks, identify and collect reliable and comprehensive information.
Download this now


Privileged account security solution
By CyberArk | 26/8/2015
Best practices dictate that privileged accounts should be incorporated into an organisation’s core security strategy. Privileged accounts are a security problem and need singular controls put in place to protect, monitor, detect and respond to all privileged account activity. This whitepaper looks at which security solution can protect you the best.
Download this now


Global financial services firm overcomes operational complexity
By CyberArk | 26/8/2015
This case study looks at how one of the oldest global financial services firms in the US overcame operational complexity by adopting a privileged identity management solution. They were able to drive down costs to lines of business through better use of automation and centralisation of databases.
Download this now


Case study: BT depends on CyberArk to secure and monitor privileged accounts
By CyberArk | 26/8/2015
This case study looks at how BT, one of the world’s leading communications services companies, implemented CyberArk to manage privileged accounts - going from a fragmented, un-scalable mix of solutions to one, streamlined solution that met all their goals in the short and long term.
Download this now


7 Things to consider when evaluating privileged account security solutions
By CyberArk | 26/8/2015
You’re convinced that protecting privileged accounts is paramount in your security strategy, But how do you go about selecting the right solutions from the right provider? You need a guide to know what to expect, and what to look for as you evaluate potential privileged account security solutions. To help you make informed decisions, this guide will give you the seven questions to ask every potential vendor.
Download this now


The good shepherd model for cybersecurity
By Nuix | 5/8/2015
This whitepaper will focus on how and why Australian public service must adopt the information security disciplines to locate important data, understand what it’s worth and make sure it’s protected. The paper will examine how government agencies can reduce the extent and damage of cyber security breaches by becoming ‘good shepherds’ of their data.
Download this now


Optimise IT security management & simplify compliance with SIEM tools
By LogRhythm | 22/7/2015
This whitepaper looks at the vendor landscape for Security Information & Event Management (SIEM) tools, focusing in on the situation, complication and resolutions these tools can provide. In this comprehensive comparison guide, find out which vendors stand out with exceptional features and performance.
Download this now


Security intelligence: solving the puzzle for actionable insight
By LogRhythm | 16/6/2015
The extent of security incidents and breaches seen today is so high and so widespread that no organisation should be complacent. Rather, organisations should work on the principle that it is probable that they have already been breached. Traditionally, many security technologies have focussed on preventing threats from penetrating their networks, but, faced with increasingly sophisticated, well resourced, and businesslike attackers with the ability to target specific individuals and organisations with tailor-made exploits and to evade such defences, such tools are no longer sufficient. Prevention alone is not enough.
Download this now


LogRhythm and Symantec: Symantec Security Information Manager (SSIM) Migration Program
By LogRhythm | 16/6/2015
Following Symantec’s end-of-sale announcement for Symantec Security Information Manager (SSIM), customers are looking for alternative solutions to meet their SIEM needs. For customers that want or require an on-premise solution, LogRhythm has developed a simple and efficient migration path from SSIM to LogRhythm’s best-inclass Security Analytics and Intelligence Platform.
Download this now

Market Place