Whitepapers


Sort by: Date | Company | Title


Application Dependency Mapping: A Guide
By Illumio | 11/12/2018

Application context includes visibility into application components and relationships between those components within your data center and cloud environments. This is required to help you plan and implement your security segmentation strategy and protect your key business assets from threats like breaches and misuse.

Download this now


How to choose your Micro-Segmentation Strategy
By Illumio | 11/12/2018

A network-based approach to internal data center and cloud segmentation is no longer enough to address the threats of today’s enterprise. If you want to stop the spread of breaches and meet compliance requirements, the best approach is adaptive micro-segmentation.

Download this now


NTT Security 2018 Risk:Value Report
By NTT Communications | 11/12/2018

NTT Security 2018 Risk:Value Report

Download this now


CISO's guide to machine learning & user and entity behavioural analytics
By Aruba | 11/12/2018

CISO's guide to machine learning & user and entity behavioural analytics

Download this now


Closing the IT Security Gap with Automation & AI in the Era of IoT: Global
By Aruba | 10/12/2018

Closing the IT Security Gap with Automation & AI in the Era of IoT: Global

Download this now


Flinders University Builds a Digital Campus With Dell Boomi: Case Study
By Dell Boomi | 27/11/2018

Australia’s Flinders University is using the Boomi Platform to power a cloud-first strategy that will modernize IT and deliver seamless digital experiences to students and staff. Download to read more!

Download this now


Why Digital Transformation Projects Fail: 3 Winning Steps for Every CIO
By Dell Boomi | 27/11/2018

Your ambition to drive digital transformation in your organization in response to "always on" business pressures can and will fail without the right strategy. Download today to explore Why Digital Transformation Projects Fail.

Download this now


WHAT IS 802.11AX (WI-FI 6)? And why you need it
By Aruba | 27/11/2018

A lot has changed in recent years. The growth and diversity of clients as well as the types of applications and traffic being generated meant wireless standards needed to evolve to keep pace. Latency sensitive voice and video traffic are sharing airspace with IoT devices that are sending small data packets – which will slow down a wireless network.

To solve this problem, wireless networks need to provide a more efficient way to handle this growing and diverse amount of traffic as well as bandwidth needs, download this whitepaper to find the solution.

Download this now


Your Email is your weakness: Australian Orgs know they should be more cyber resilient
By Mimecast | 19/11/2018

In a growing climate of cybersecurity attacks, businesses can be shut down for hours if just one employee opens the wrong email attachment. This ever-present risk is forcing companies to take a broader look at their exposure, and in particular the cyber resilience processes they have in place to avoid damaging compromise.

Download this now


Deep Dive: Cyber Resilience for Email
By Mimecast | 19/11/2018

The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release