Whitepapers


Sort by: Date | Company | Title


10 Best Practices: Controlling Smartphone Access to Corporate Networks
By SonicWall | 11/2/2011

A universal, platform-agnostic approach to security best practices, which treats all smartphones as uncontrolled endpoints.

Download this now


10 Best practices for a great mobile web experience
By Akamai Technologies | 28/4/2015

We’ve tapped into our experience serving 30% of the world’s Web traffic to present some key factors to consider as you develop you mobile Web strategy. Download the top best practices

Download this now


10 Essential elements for a secure enterprise
By Citrix Systems Asia Pacific | 12/1/2015

This whitepaper looks at the best practices for protecting sensitive business information while enabling productivity from anywhere. You'll find:

•10 key points to consider with mobility covering security, user experience IT operations and BYOD •How to deliver the seamless, convenient mobile access that people expect •Which comprehensive capabilities you should be looking for in a provider

Download this now


10 essential elements for a secure enterprise mobility strategy
By Citrix Systems Asia Pacific | 25/3/2014

Best practices for protecting sensitive business information while making people productive from anywhere.

Download this now


10 Essential Steps to Email Security
By Clearswift Asia Pacific | 2/8/2013

The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online collaboration has matured and become more and more integral to many people’s lives, companies are increasingly using such technologies to connect more effectively with their customers, suppliers and partners. This short guide outlines 10 simple steps to best practice in web security. Find out how to stay in-front of your competitors. Click to Download!

Download this now


10 Essential Steps to Email Security
By Clearswift Asia Pacific | 3/11/2011

Modern business is reliant on email. All organisations using email need to answer the following questions: How do we control spam volumes without the risk of trapping a business email? How do we prevent infections from email-borne viruses? How do we stop leakage of confidential information? Can we detect and stop exploitation from phishing attacks? How do we control brand damage from occurring due to employee misuse? How do we prevent inappropriate content from being circulated?

Download this now


10 Essential Steps to Web Security
By Clearswift Asia Pacific | 2/8/2013

The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online collaboration has matured and become more and more integral to many people’s lives, companies are increasingly using such technologies to connect more effectively with their customers, suppliers and partners. This short guide outlines 10 simple steps to best practice in web security. Find out how to stay in-front of your competitors

Download this now


10 Essential Steps to Web Security
By Clearswift Asia Pacific | 3/11/2011

This short guide outlines 10 simple steps to best practice in web security. Follow them all to step up your organisation’s information security and stay ahead of your competitors. But remember that the target never stands still. Focus on the principles behind the steps – policy, vigilance, simplification, automation and transparency – to keep your information security bang up to date.

Download this now


10 Reasons to Strengthen Security with App and Desktop Virtualization
By Citrix | 25/5/2016

Regain control and reduce risk without sacrificing business productivity and growth.

By using virtualization, organisations can pursue top priorities such as mobility, flexwork and consumerization while effectively managing risk, securing information, supporting global compliance and strengthening business continuity planning.

Download this now


10 Steps to mitigate a DDoS attack in real time
By F5 Networks | 13/1/2015

A DDoS attack can be a scary, stressful ordeal if you’re not experienced. This infographic walks you through the steps to maximize success in fighting an attack when it happens.

Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release