White Papers/Resources

The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.


The Australian data privacy index report

Supplied by Informatica Australia on 13 February, 2014

Data privacy is a key issue for Australian organisations; however, many do not fully understand the importance or the repercussions for failing to protect sensitive information. This report provides a snapshot of how Australian organisations view and treat data privacy.


Ten cooling solutions to support high-density server deployment

Supplied by Schneider Electric on 13 February, 2014

This paper provides 10 approaches for increasing cooling efficiency, cooling capacity and power density in existing data centres. Download now to read more.


Containerised power and cooling modules for data centres

Supplied by Schneider Electric on 13 February, 2014

This paper compares standardised data centre facilities to traditional data centres and provides a cost and advantages overview to help identify which environment may be best for your organisation.


Top tips to avoid power quality disturbances

Supplied by Schneider Electric on 13 February, 2014

This paper reviews the most common types of power disturbances, what causes them and how to protect your critical equipment using IEEE standards. Download now to read more.


Practical options for deploying IT equipment in server rooms and offices

Supplied by Schneider Electric on 13 February, 2014

This paper looks at typical problems with small server rooms and branch offices and some methods of improving the availability of IT operations in these scenarios. Download now.


Creating order from chaos in data centres and server rooms

Supplied by Schneider Electric on 13 February, 2014

This paper outlines several innovative approaches for dealing with the common chaos in data centres and for eliminating the root causes of disorder. Download now.


Top 5 malware trends for 2014 and how to combat them

Supplied by Webroot Pty Ltd on 23 January, 2014

This paper discusses the top five malware trends to watch out for in 2014 and how important it is to have a security solution that provides endpoint protection. Download now.

 


Eight ways to generate new revenue with business intelligence and analytics

Supplied by Information Builders on 17 January, 2014

This paper looks at turning the buzz of predictive analytics, social, mobile and other new growth strategies into revenue using eight important technologies. Download now. 


A practical path to unified identity across data centre, cloud and mobile

Supplied by Centrify Asia Pacific on 15 January, 2014

This white paper looks at a group of unified identity services that could help leverage your existing Active Directory skill sets and processes while enabling productivity and secure access for a dynamic mobile workforce.  


Office 365 Single Sign-On: high availability without high complexity

Supplied by Centrify Asia Pacific on 15 January, 2014

This paper explains why Single Sign-On between your on-premise network and O365 is so important and why implementation is surprisingly difficult to achieve using the accessory tools provided. It also looks at a service to leverage your pre-existing infrastructure. 


Enforcing enterprise-out security for cloud servers

Supplied by Centrify Asia Pacific on 15 January, 2014

This white paper looks at an enterprise-out security enforcement approach to expanding cloud compute capacity while still maintaining a secure environment. Download now to read more. 


CryptoLocker: your money or your life

Supplied by Webroot Pty Ltd on 18 December, 2013

A new form of malware called CryptoLocker has recently been identified. It is designed to extort money from victims by denying them access to their personal computer files. It targets all Windows operating systems and once infiltrated, files are destroyed unless a ransom is paid.

Download this white paper for more information on this new form of ‘ransomware’ and how the Webroot SecureAnywhere solution can help. 


Cloud-based mobile device security streamlines data protection

Supplied by Webroot Pty Ltd on 18 December, 2013

Learn why cloud-based security offers superior protection while meeting requirements for identifying and preventing access to malicious sites, as well as reducing complexity and management time of IT staff. 


Enterprise wireless LANs (WLAN): what to expect from 802.11ac

Supplied by Alcatel Lucent on 11 December, 2013

The IEEE 802.11ac standard takes many of the best techniques the Wi-Fi industry has learned about 802.11n and has made extraordinary improvements on them, including wider channels and higher-rate modulation. These advancements will break down the last remaining barriers to the all-wireless office in enterprise networks.

Download this white paper to read more. 


Management of security risk in information technology

Supplied by Centrify Asia Pacific on 12 November, 2013

The white paper addresses the Monetary Authority of Singapore (MAS) internet banking and technology risk management guidelines. 


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd