Whitepapers


Sort by: Date | Company | Title


Securing Customer Trust In Australia's Financial Services
By VMware Australia | 22/1/2019

Australia’s financial institutions are among the most sophisticated in the world. Once ubiquitous in-branch interactions have now been virtually replaced by ATMs, online transactions and mobile services, integrating emerging technologies to create value and personalize services for customers.

The financial sector is also the second least trusted industry in all of Australia. In financial services, ‘trust’ is the foundation of the relationship between institution and individual.

Read More to find out how to Secure Customer Trust.

Download this now


How coffee can improve security.
By NTT Communications | 20/12/2018

Single isolated events or an annual training exercise are not enough to get people to buy into security. Claire Pales. Pales is the author of the best-selling “The Secure CIO”, specialises in security and risk at advisory firm IBRS and once worked as head of security for a major web-based entertainment company. Read this report on how you can increase employee engagement.

Download this now


University of Technology Sydney and NTT ICT partner on cloud-first strategy
By NTT Communications | 20/12/2018

As part of its cloud-first strategy, UTS places extremely high emphasis on the availability and security of its users’ data. The university recently adopted Microsoft Office 365 for all students and staff, while maintaining strict guidelines around data sovereignty and security. Doing so has “enabled huge productivity and collaboration gains between students, lecturers, and other faculty staff,” says Steve McEwan, Technical Services Manager, UTS.

Download this now


2018 Global Threat Intelligence Report
By NTT Communications | 12/12/2018

2018 Global Threat Intelligence Report

Download this now


Global Threat Intelligence Infographic APAC
By NTT Communications | 12/12/2018

Global Threat Intelligence Infographic APAC

Download this now


Application Dependency Mapping: A Guide
By Illumio | 11/12/2018

Application context includes visibility into application components and relationships between those components within your data center and cloud environments. This is required to help you plan and implement your security segmentation strategy and protect your key business assets from threats like breaches and misuse.

Download this now


How to choose your Micro-Segmentation Strategy
By Illumio | 11/12/2018

A network-based approach to internal data center and cloud segmentation is no longer enough to address the threats of today’s enterprise. If you want to stop the spread of breaches and meet compliance requirements, the best approach is adaptive micro-segmentation.

Download this now


NTT Security 2018 Risk:Value Report
By NTT Communications | 11/12/2018

NTT Security 2018 Risk:Value Report

Download this now


CISO's guide to machine learning & user and entity behavioural analytics
By Aruba | 11/12/2018

CISO's guide to machine learning & user and entity behavioural analytics

Download this now


Closing the IT Security Gap with Automation & AI in the Era of IoT: Global
By Aruba | 10/12/2018

Closing the IT Security Gap with Automation & AI in the Era of IoT: Global

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release