Internet Whitepapers


Sort by: Date | Company | Title


Security in a Faster Forward World
By Akamai Technologies | 23/1/2014

Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.

Download this now


Bandwidth Bandits
By Symantec | 15/3/2013

Imagine if you gave up a quarter of your office space for non-work activities; it’s inconceivable. But when it comes to internet bandwidth, most companies loose the same proportion to employee web misuse, streaming media and spam. As a company’s internet is both costly and limited, click here to find out how best reduce bandwidth loss.

Download this now


Controlling Peer-to-Peer and Recreational Internet Traffic
By Exinda | 26/11/2012

This paper will discuss strategies for controlling a broad range of recreational Internet traffic such as instant messaging, P2P file downloads and social networking activities that can significantly slow business applications and impact employee productivity. By implementing a solution to effectively detect, classify and control recreational traffic, including encrypted P2P traffic designed to slip past corporate firewalls, organisations can improve employee productivity, accelerate application response times, reclaim bandwidth for business-critical applications and defer costly bandwidth upgrades. Read this whitepaper.

Download this now


Why Hackers have Turned to Malicious JavaScript Attacks
By Sophos | 6/7/2011

Website attacks have become a serious business proposition. In the past, hackers may have infected websites to gain notoriety or just to prove they could—but today, it’s all about the money. Reaching unsuspecting users through the web is easy and effective. Hackers now use sophisticated techniques—like injecting inline JavaScript—to spread malware through the web. Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant.

Download this now


Best Practices for Converting from Lotus Notes/Domino® to Google Apps
By Google | 4/3/2011

For organizations considering an upgrade to the latest version of Notes® or for those that may desire a change —this document outlines a 10-step process for determining if Google Apps is a viable, cost-effective alternative.

Download this now


IP Telephony: Reliability You Can Count On
By Shoretel | 10/2/2011

One of the fundamental design goals of the Internet was to achieve an unprecedented level of communications network resilience. As a result, packet-switched networks fundamentally enable fault tolerance, adaptive routing, and disaster recovery, so it is quite possible—and can be quite cost-effective—to build IP-based communications systems that are more reliable than circuit-switched PBX platforms. The key is to start with the right foundation. Read on.

Download this now


Considering Your Online Security Options: Beginners Guide to SSL Certificates
By VeriSign Australia | 9/12/2010

This VeriSign guide will demystify the technology involved and give you all the information you need to make the best decision when considering your online security options.

Download this now

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?