Whitepapers


Sort by: Date | Company | Title


Password reset: The time vampire of the IT universe
By Attachmate Australasia | 14/8/2014
Despite analysts and the media turning their attention to multi-factor authentication and biometrics, passwords are still one of the most important authentication methods. This paper discusses potential password policies. · We’re keen to move beyond passwords because they’re insecure or they waste time, and security can suffer because users have poor password hygiene · Anecdotal evidence suggests that between one-sixth and one-third of all help desk calls still focus on passwords · According to Gartner, calls for basic password resets can constitute 20% or more of calls to the average service desk
Download this now


Contractor access: Mitigating security and risk issues
By Attachmate Australasia | 14/8/2014
Today’s workforce is expanding to include a growing number of contractors, despite high-profile security incidents. This paper identifies how to mitigate risks in what’s often a necessary business decision. · Many businesses don’t really have the luxury of asking, “can we afford the risk of a contractor?” · Companies like Target, Cogent Healthcare, Stanford Hospital, Beebe Healthcare and even the EPA have had breaches that were the result of “temporary” access · A substantial roadblock to productivity is granting them access to necessary systems, which in many cases house sensitive information
Download this now


Managing the consumerisation of IT: Mobile access for the BYOD world
By Attachmate Australasia | 13/8/2014
Done right, BYOD can improve both productivity and job satisfaction. But done incorrectly, it can frustrate employees and lead to significant security concerns. · In 2012, Ovum pointed out the growing risk from unmanaged BYOD · The wide-open approach has done a lot to bring personal devices into the workplace, creating justified concerns about risk. · A recent Microsoft survey suggests personal technology has a positive impact in transforming our lives as well as innovation
Download this now


The complete guide to log and event management
By Attachmate Australasia | 13/8/2014
Everybody has logs and ultimately will have to deal with them. In this guide, Dr. Anton Chuvakin analyses the relationship between SIEM and log management for a new solution. · Security information and event management (SIEM) emerged in the 1990s, but it has always been controversial · This paper analyses the relationship between SIEM and log management, focusing on technical differences, uses and architecting joint deployments · Dr Chuvakin provides recommendations for companies that have deployed log management or SIEM so they can plot their roadmap for enhancing deployment
Download this now


Advanced persistent threats: Hijacking insider credentials
By Attachmate Australasia | 13/8/2014
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
Download this now


Five customers deliver virtual desktops and apps to empower a modern workforce
By Citrix Systems Asia Pacific | 6/7/2014
Application and desktop virtualization allows IT to address a broad range of business priorities from empowering workers across remote and branch locations to mobilizing Windows apps on any device. At the same time, an all-at-once, one-size-fits-all implementation is neither realistic nor desirable for most enterprises. IT’s plans for app and desktop virtualization need to align with corporate budgets and priorities, and provide the right desktop in the right way for each user.
Download this now


Three keys to accelerate application performance– wherever people work
By Citrix Systems Asia Pacific | 6/7/2014
Deliver a great user experience with proven strategies to dramatically cut network wait time and enable full mobile and remote productivity
Download this now


Creating and Enforcing Advanced Access Policies with Citrix XenApp
By Citrix Systems Asia Pacific | 6/7/2014
Granular policies for users, devices, locations and connection types let you secure and manage the user experience the right way to enable any mobile workspace scenario.
Download this now


Land Information New Zealand End User Computing Case Study
By Citrix Systems Asia Pacific | 6/7/2014
This Tech Research Asia end user case study analyses the results of the adoption of virtual desktop infrastructure (VDI) by Land Information New Zealand (LINZ) to support its end user computing strategy. This strategy includes the establishment of a three-tier IT service model. This case study also investigates the reasons why LINZ adopted the technology, the goals it was striving to achieve, and the outcomes it has realised. This case study also provides advice to technology leaders considering their own workplace strategy.
Download this now


Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
By Citrix Systems Asia Pacific | 6/7/2014
A technical how-to guide— updated for Android 4.4, iOS 7.1, and Windows Phone and Surface 8.1.
Download this now

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?