White Papers: network


Sort by: Date | Company | Title


Fraud Intelligence Analysis
By IBM | 26/9/2013
Fraud is significantly and evolving challenge for the financial industry, costing an estimated five to eight percent of revenues per annum. Companies had traditionally countered fraud with solutions that target known threats, however this 'rear-view-approach' can also fail to spot new and emerging attacks. In this whitepaper, we look at critical insights that aid in investigating complex incidents, whilst producing actionable visualisation. Click to download!
Download this now


Fighting Fraud with Big Data
By IBM | 26/9/2013
For industries with a full-time focus on fighting fraud, intelligence is invaluable. Whilst the annual cost of fraud is substantial and the benefits of reducing it are very real, we find that enterprises with proactive and predictive approaches to fighting fraud have a greater visibility and intelligence of possible fraud. Click to find out more.
Download this now


Carrier Class Product Assessment
By Alcatel-Lucent | 2/7/2013
One of the prevailing myths surrounding carrier class data centre solutions is that their implementation is either difficult to configure or create high maintenance costs. Network managers of telephony networks, due to high network demand, require resilience and simplicity in their design. In this whitepaper, we look at the strengths and weaknesses of competing enterprise data centre solution. Read now.
Download this now


NetApp FAS6240 Clustered SAN Champion of Champions
By NetApp | 17/4/2013
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.
Download this now


Bandwidth Bandits
By Symantec | 15/3/2013
Imagine if you gave up a quarter of your office space for non-work activities; it’s inconceivable. But when it comes to internet bandwidth, most companies loose the same proportion to employee web misuse, streaming media and spam. As a company’s internet is both costly and limited, click here to find out how best reduce bandwidth loss.
Download this now


Spear-Phishing Email: Most Favored APT Attack Bait
By Trend Micro | 30/11/2012
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Download this now


Detecting APT Activity with Network Traffic Analysis
By Trend Micro | 13/11/2012
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Download this now


Ryerson University Case Study
By Exinda | 18/10/2012
A key priority for Ryerson is to provide consistent access to network applications, which range from a public-facing web site to critical applications such as student registration and learning management. With students, faculty, and staff all vying for the same resources on the network (including as many as 5000 wireless users at any given time), Ryerson needed a way to provide a predictable user experience. Read more.
Download this now


MLB Network Case Study
By Exinda | 18/10/2012
From 2009 through early 2011 MLB Network connected to the outside world through dual 45-megabit DS3 circuits, but with as many as 1000 users during the baseball season transferring everything from video files to player statistics, the network had reached saturation. “We were seeing 98% utilisation on our routers then, and wanted to ensure we were prepared for the MLB First-Year Player Draft in June,” said MLB Network IT director Cindy Cortell. Read more.
Download this now


Bring Your Own Device - Device Freedom Without Compromising the IT Network
By Cisco | 3/10/2012
This whitepaper discusses how the BYOD mega-trend will affect businesses; explores the IT challenges involved, and outlines the technology solutions available. Read on to discover the business activity driving these trends, plus a new way to address the challenges, allowing end users the freedom to bring their choice of device to work while still affording IT the controls to ensure security and prevent data loss.
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?