Security Whitepapers


Sort by: Date | Company | Title


10 Best Practices: Controlling Smartphone Access to Corporate Networks
By SonicWall | 11/2/2011

A universal, platform-agnostic approach to security best practices, which treats all smartphones as uncontrolled endpoints.

Download this now


10 essential elements for a secure enterprise mobility strategy
By Citrix Systems Asia Pacific | 25/3/2014

Best practices for protecting sensitive business information while making people productive from anywhere.

Download this now


10 Essential Steps to Email Security
By Clearswift Asia Pacific | 2/8/2013

The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online collaboration has matured and become more and more integral to many people’s lives, companies are increasingly using such technologies to connect more effectively with their customers, suppliers and partners. This short guide outlines 10 simple steps to best practice in web security. Find out how to stay in-front of your competitors. Click to Download!

Download this now


10 Essential Steps to Email Security
By Clearswift Asia Pacific | 3/11/2011

Modern business is reliant on email. All organisations using email need to answer the following questions: How do we control spam volumes without the risk of trapping a business email? How do we prevent infections from email-borne viruses? How do we stop leakage of confidential information? Can we detect and stop exploitation from phishing attacks? How do we control brand damage from occurring due to employee misuse? How do we prevent inappropriate content from being circulated?

Download this now


10 Essential Steps to Web Security
By Clearswift Asia Pacific | 2/8/2013

The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online collaboration has matured and become more and more integral to many people’s lives, companies are increasingly using such technologies to connect more effectively with their customers, suppliers and partners. This short guide outlines 10 simple steps to best practice in web security. Find out how to stay in-front of your competitors

Download this now


10 Essential Steps to Web Security
By Clearswift Asia Pacific | 3/11/2011

This short guide outlines 10 simple steps to best practice in web security. Follow them all to step up your organisation’s information security and stay ahead of your competitors. But remember that the target never stands still. Focus on the principles behind the steps – policy, vigilance, simplification, automation and transparency – to keep your information security bang up to date.

Download this now


10 Mobile Security Requirements for the Bring Your Own Device (BYOD) Enterprise
By Accellion | 3/4/2012

An enterprise mobility strategy needs to include more than the provisioning and security services available through mobile application and MDM solutions. To meet the mobility and security requirements of mobile users, enterprises need to look at deploying a solution for mobile content management (MCM) that supports BYOD policies. Read this whitepaper to learn: Why provisioning for mobile users has become more complex; Ten requirements to consider when selecting a mobile content security solution.

Download this now


10 Things Your Next Firewall Must Do
By Palo Alto Networks | 24/1/2012

While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprisefocused, and distinct, many network security vendors are claiming NGFW is a subset of other functions (e.g. UTM or IPS). Most traditional network security vendors are attempting to provide application visibility and control by using a limited number of application signatures supported in their IPS or other external database. But underneath, these capabilities are poorly integrated and their products are still based on legacy port-blocking technology, not NGFW technology. Read on.

Download this now


2012 Data Breach Investigations Report
By HP | 5/4/2012

A study conducted by Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit and United States Secret Service. This year our DBIR includes more incidents, derived from more contributors, and represents a broader and more diverse geographical scope. The number of compromised records across these incidents skyrocketed back up to 174 million after reaching an all-time low (or high, depending on your point of view) in last year’s report of four million. In fact, 2011 boasts the second-highest data loss total since we started keeping track in 2004. Read this report.

Download this now


2012 Mid-Year Trend and Risk Report
By IBM Australia | 25/7/2013

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents, continue their upward trajectory and have already hit new highs in 2011. Click to download!

Download this now

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?