Menu

White Papers

Featured White Papers



Accelerate time to business value with HPE Synergy and HPE Pointnext
By HPE | 1/9/2017

The digital economy—today and into the future

Today’s enterprises are experiencing increasing pressures that are disrupting their traditional business model. If customers do not address these pressures and evolve, they may risk the loss of market share, revenue, decreased stock prices, and more.

Download this now


Everything You Need to Know About Cyber Threats But Were Too Afraid To Ask
By Diligent | 9/5/2017

Boards of directors are too often kept in the dark about the security risks to their organisations. That’s what the Ponemon Institute discovered last June when they surveyed members of the board of directors and IT security experts from the same companies.

The Ponemon researchers found that 30% of directors acknowledge that they don’t understand the risks that their organisation faces in security matters. Yet more than 50% of the IT security experts believe that the directors who sit on the boards of their companies don’t understand the security environment that they are working in, or the risks it represents. Read this today..

Download this now


Beyond the Password
By Data #3 | 15/8/2017

​This paper explores how enterprises can move beyond the password (something the user ‘knows’) to an intelligent authentication process that eliminates the risk of weak and vulnerable passwords. It works by cross-validating with other authentication methods like a physical item such as a token or smartphone (something the user ‘has’) and/or a personal attribute like a fingerprint or retina scan (something the user ‘is’). Two-factor (2FA) authentication and multifactor authentication (MFA) are now possible with intelligent authentication across corporate software, Cloud services and smart device apps.

Download this now


Advancing your anti-phishing program: How to be successful against email-borne attacks
By Mimecast | 18/8/2017

There appears to be no end in sight to the reign of phishing as the cyber attacker's number one threat delivery and communication vehicle. No surprise that the Verizon DBR 2017 report dubbed email as the "cyber spy's favored way in". Whether it's a script kiddie just goofing around, a member of one of the world's most sophisticated nation-state-based attacker groups trying to impact global politics, or a cybercriminal focused on turning digital information into digital cash, they all use email in their attack repertoire.

Download this now


How to stay protected against ransomware
By Sophos | 1/8/2017

Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity.

Download this now