The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.
The Australian public sector faces a unique combination of severe budget constraints, growing demand, innovation in technology and the mainstream adoption of on-line channels. The scalability, availability, and lower transaction costs offered by digital self-service have become critical to the development of cost effective public services.
The ability for data centres to stay up and running requires advanced rack power distribution units (PDUs) that can precisely monitor every aspect of power and enable the management of power distribution. Without advanced PDUs, data centres risk being unable to keep up with the ever-expanding business requirements.
DDoS attacks are skyrocketing in frequency and scale. 81% of incidents are multi-vector threats and botnets are getting smarter. Your vendor must now ensure that they can scale to mitigate the largest multi-vector attacks at your network's edge.
To provide a premium shopper experience, wireless networks now need to be designed to excel in the new connected retail environment.
The M-Trends report for 2015 provides unique insight and analysis on how attackers' motives and tactics are changing. From the collation of hundreds of critical security incidents over 30 industries, it is evident that organisations allow attackers to linger far too long in compromised environments.
Companies must invest in the right infrastructure, platforms and devices or risk becoming disconnected in an increasingly-connected world. Unified communications (UC) technology is emerging as a critical element in the mobile space for more efficient workplace collaboration.
In an era when the cost of powering venues like data centres completely eclipses other costs, data centre operators and customers need to think of efficiency as well as availability and performance. The aim must be to create better data centre density that makes more intelligent use of scarce resources and provides the best return out of what is an increasingly critical and heavy investment for many organisations.
Prefabricated modular data centres vary in function, form and configuration. Selecting the right type, however, has traditionally been difficult due to the lack of standard terminology to distinguish them apart.
Single sign-on (SSO) has long been the go-to technology to ensure convenient password synchronisation, replay and security. The move towards more web-based access methods, however, makes it difficult for yesterday's SSO solution to meet today's evolving application requirements.
Multi-tenant data centres are opening in record numbers. Facilities, now more than ever, must maintain extremely high levels of energy efficiency to remain competitive. There are many hurdles that can make meeting this goal difficult, however.
Considering that 96% of standard defence-in-depth systems have been breached, data violation is seemingly inevitable. It is now about how you will respond when it occurs. The business with the well-designed incident response plan is better off than the business without one.
Possessing the most valuable and visible property of your organisation — your web, DNS, database and email servers — data centres have become the number one target of cybercriminals, hacktivists and state-sponsored attackers.
The high value of personal information and the ease of its marketability has led to Australian government organisations being heavily targeted for cybercrime. The Australian public service must now adopt new security disciplines to combat the inevitable breach and protect high-value and high-risk data.
Once you have decided to implement two-factor authentication, what is the next step? With the multitude of solutions available in the market today, how do you know which is going to be right for your organisation?
The ever-expanding list of malware is forever evolving. Traditional security software only prevents 45% of current attacks. Now, to minimise the impact of successful breaches, every organisation needs to be prepared to defend, detect and respond at machine speed — relying on humans is no longer possible.