White Papers/Resources

The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.

Note: This is a Member only section and will require you to log-in or join up.

Creating order from chaos in data centres and server rooms

Supplied by Schneider Electric on 13 February, 2014

This paper outlines several innovative approaches for dealing with the common chaos in data centres and for eliminating the root causes of disorder. Download now.

Top 5 malware trends for 2014 and how to combat them

Supplied by Webroot Pty Ltd on 23 January, 2014

This paper discusses the top five malware trends to watch out for in 2014 and how important it is to have a security solution that provides endpoint protection. Download now.


Eight ways to generate new revenue with business intelligence and analytics

Supplied by Information Builders on 17 January, 2014

This paper looks at turning the buzz of predictive analytics, social, mobile and other new growth strategies into revenue using eight important technologies. Download now. 

A practical path to unified identity across data centre, cloud and mobile

Supplied by Centrify Asia Pacific on 15 January, 2014

This white paper looks at a group of unified identity services that could help leverage your existing Active Directory skill sets and processes while enabling productivity and secure access for a dynamic mobile workforce.  

Office 365 Single Sign-On: high availability without high complexity

Supplied by Centrify Asia Pacific on 15 January, 2014

This paper explains why Single Sign-On between your on-premise network and O365 is so important and why implementation is surprisingly difficult to achieve using the accessory tools provided. It also looks at a service to leverage your pre-existing infrastructure. 

Enforcing enterprise-out security for cloud servers

Supplied by Centrify Asia Pacific on 15 January, 2014

This white paper looks at an enterprise-out security enforcement approach to expanding cloud compute capacity while still maintaining a secure environment. Download now to read more. 

CryptoLocker: your money or your life

Supplied by Webroot Pty Ltd on 18 December, 2013

A new form of malware called CryptoLocker has recently been identified. It is designed to extort money from victims by denying them access to their personal computer files. It targets all Windows operating systems and once infiltrated, files are destroyed unless a ransom is paid.

Download this white paper for more information on this new form of ‘ransomware’ and how the Webroot SecureAnywhere solution can help. 

Cloud-based mobile device security streamlines data protection

Supplied by Webroot Pty Ltd on 18 December, 2013

Learn why cloud-based security offers superior protection while meeting requirements for identifying and preventing access to malicious sites, as well as reducing complexity and management time of IT staff. 

Enterprise wireless LANs (WLAN): what to expect from 802.11ac

Supplied by Alcatel Lucent on 11 December, 2013

The IEEE 802.11ac standard takes many of the best techniques the Wi-Fi industry has learned about 802.11n and has made extraordinary improvements on them, including wider channels and higher-rate modulation. These advancements will break down the last remaining barriers to the all-wireless office in enterprise networks.

Download this white paper to read more. 

Management of security risk in information technology

Supplied by Centrify Asia Pacific on 12 November, 2013

The white paper addresses the Monetary Authority of Singapore (MAS) internet banking and technology risk management guidelines. 

The BYOD survival guide: 5 tips for practising safe mobile file access and collaboration

Supplied by Acronis on 04 November, 2013

This guide reviews the bring-your-own-device (BYOD) trend, outlines the importance of having a clear use policy for data protection and identifies five tips for practising safe BYOD in your organisation. 

Network management success stories: an eBook

Supplied by SolarWinds Software on 30 October, 2013

This eBook comprises three local case studies of network management software, each one outlining the problem faced and the way a suite of product offerings helped to overcome it.  

Data centre projects: system planning

Supplied by Schneider Electric on 08 October, 2013

Data centre implementation or upgrade projects can be simplified by viewing the system planning as a standardised process consisting of specific tasks resolved in the right order by the right people. Treating the planning process as a science not an art can ensure requirements are translated into a detailed design.  

Data centre projects: advantages of using a reference design

Supplied by Schneider Electric on 08 October, 2013

Adopting a reference design for both new data centres and upgrades to existing data centres can have a positive impact on operations. Reference designs simplify and shorten the planning and implementation process and reduce downtime risks once up and running. 

The 8 worst practices in master data management and how to avoid them

Supplied by Information Builders on 04 October, 2013

Master data management (MDM) is a key foundation for trusted data and using it strategically can differentiate companies from their competitors. It touches nearly every important activity in a company and depends on a partnership between business and IT. Avoid a dead end with your MDM program by reading this paper.  

  • All content Copyright © 2020 Westwick-Farrow Pty Ltd