The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.
This paper outlines several innovative approaches for dealing with the common chaos in data centres and for eliminating the root causes of disorder. Download now.
This paper discusses the top five malware trends to watch out for in 2014 and how important it is to have a security solution that provides endpoint protection. Download now.
This paper looks at turning the buzz of predictive analytics, social, mobile and other new growth strategies into revenue using eight important technologies. Download now.
This white paper looks at a group of unified identity services that could help leverage your existing Active Directory skill sets and processes while enabling productivity and secure access for a dynamic mobile workforce.
This paper explains why Single Sign-On between your on-premise network and O365 is so important and why implementation is surprisingly difficult to achieve using the accessory tools provided. It also looks at a service to leverage your pre-existing infrastructure.
This white paper looks at an enterprise-out security enforcement approach to expanding cloud compute capacity while still maintaining a secure environment. Download now to read more.
A new form of malware called CryptoLocker has recently been identified. It is designed to extort money from victims by denying them access to their personal computer files. It targets all Windows operating systems and once infiltrated, files are destroyed unless a ransom is paid.
Download this white paper for more information on this new form of ‘ransomware’ and how the Webroot SecureAnywhere solution can help.
Learn why cloud-based security offers superior protection while meeting requirements for identifying and preventing access to malicious sites, as well as reducing complexity and management time of IT staff.
The IEEE 802.11ac standard takes many of the best techniques the Wi-Fi industry has learned about 802.11n and has made extraordinary improvements on them, including wider channels and higher-rate modulation. These advancements will break down the last remaining barriers to the all-wireless office in enterprise networks.
Download this white paper to read more.
The white paper addresses the Monetary Authority of Singapore (MAS) internet banking and technology risk management guidelines.
This guide reviews the bring-your-own-device (BYOD) trend, outlines the importance of having a clear use policy for data protection and identifies five tips for practising safe BYOD in your organisation.
Data centre implementation or upgrade projects can be simplified by viewing the system planning as a standardised process consisting of specific tasks resolved in the right order by the right people. Treating the planning process as a science not an art can ensure requirements are translated into a detailed design.
Adopting a reference design for both new data centres and upgrades to existing data centres can have a positive impact on operations. Reference designs simplify and shorten the planning and implementation process and reduce downtime risks once up and running.
Master data management (MDM) is a key foundation for trusted data and using it strategically can differentiate companies from their competitors. It touches nearly every important activity in a company and depends on a partnership between business and IT. Avoid a dead end with your MDM program by reading this paper.