Risk management Whitepapers


Sort by: Date | Company | Title


Top 10 Tips for Cyber Resilience
By Symantec | 22/5/2014

Presented in the form of the top 10 tips for cyber resilience, this whitepaper provides a simple, easy to digest guide for enterprise on how best to secure your business against cyber risk and threats.

Download this now


A Manifesto for Cyber Resilience
By Symantec | 22/5/2014

With the growing transition to a more online existence, users need to be more conscious about leading and protecting our online identity. This Manifesto sets out a plan to reduce the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Download this now


CISO 2013 Security Insights: A new standard for security leaders
By IBM Australia | 20/3/2014

Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.

Download this now


Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
By Tenable Network Security | 10/3/2014

This report assesses the current state and effectiveness of vulnerability management.

Download this now


50 Questions When Considering The Cloud
By Lyris Technologies | 30/1/2014

When considering whether or not to move to the cloud, there’s many questions you need to consider, and it’s unlikely that any single vendor will provide all the answers. This whitepaper provides your organisation a detailed list of security considerations to discuss both internally and with transparent vendors. Finding the right answers will help you develop a proper risk assessment and make informed decisions about cloud computing in your business.

Download this now


The Application Usage and Threat
By Palo Alto Networks | 14/11/2013

This whitepaper provides provides a global view into enterprise application usage and the associated threats by summarizing network traffic assessments conducted in 3,056 organizations worldwide in 2012. The application and threat patterns discussed within this report dispel the position that social networking, filesharing and video applications are the most common threat vectors, while reaffirming that internal applications are highly prized targets.

Download this now


Delivering a Secure Cloud
By Trend Micro Australia | 14/10/2013

In this video, we hear from Sanjay Mehta, Managing Director of Trend Micro, on solutions that allow customers to secure their applications and data, whilst enjoying the benefits of Amazon Web Services Cloud Solutions.

Download this now


Global Cloud Security Software Market
By Trend Micro Australia | 14/10/2013

Even though the Global Cloud Security Software market is currently growing at a rate of over 25%, the market is pegged with strong growth inhibitors, including the lack of awareness among end-users about the risks associated with cloud computing. In this whitepaper, we look at the market as a whole and its direction into the future.

Download this now


Helping Companies Fight Against Targeted Attacks
By Trend Micro Australia | 23/9/2013

Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.

Download this now


Benchmarks for Security - A Comparative Test
By Webroot | 5/9/2013

In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!

Download this now

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?