White Papers/Resources

The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.

Note: This is a Member only section and will require you to log-in or join up.


Simplifying network administration in an Alcatel-Lucent VMware virtual environment

Supplied by Alcatel Lucent on 01 July, 2013

VMware's server virtualisation allows IT organisations to use network computing and storage resources more efficiently. But a virtual infrastructure requires a different set of management tools than those used to manage a physical infrastructure.


A coordinated virtual infrastructure for SDN in enterprise networks

Supplied by Alcatel Lucent on 01 July, 2013

Increasing agility and automation in the data centre to optimise application delivery requires a complete, end-to-end, coordinated virtual infrastructure. This infrastructure will allow applications and the physical network to collaborate, thereby providing a high quality experience for users and enabling optimisation of resources.


Network route monitoring

Supplied by SolarWinds Software on 28 June, 2013

Advanced routing protocols designed to automatically identify and update the optimal traffic route make it increasingly difficult for the network professional to keep up with the state and topology of network routes. Network failures are characterised by a variety of different symptoms (loss of connectivity, inability to reach a destination or a slow network) resulting from a variety of root causes (configuration errors, missing routes in a routing table or route flapping). This white paper looks further into this issue and some possible troubleshooting solutions. 


Network IP multicast monitoring and troubleshooting

Supplied by SolarWinds Software on 28 June, 2013

Multicast is a special type of network traffic where packets are delivered to a group of destinations as a single transmission. Multicast is used for advanced network services such as multimedia distribution, finance and education. Compared to unicast, in which one computer talks directly to another computer, and broadcast, in which one computer talks to all computers, multicast provides an optimised and targeted communication path from the device to a select group of other devices within its group.

This white paper reviews a solution to help monitor and troubleshoot network multicast issues. Download now. 


The ROI of network management and monitoring

Supplied by SolarWinds Software on 28 June, 2013

Implementation of a network management solution can have a tremendous financial benefit to your organisation if you select a cost-effective solution.

This white paper reviews a software solution that helps detect network issues, track response time and show stats in real time. Download now to read about more features. 


The new integration: application integration in the 21st-century world

Supplied by Tibco Software on 25 June, 2013

Integration has been one of the most powerful approaches to leveraging the value of existing IT assets and will likely become even more important in the near future. But in an IT landscape dominated by big data, social networking and cloud computing, integration will not only grow in importance, its very nature will change. 


Five principles for integrating software-as-a-service applications

Supplied by Tibco Software on 25 June, 2013

According to Forrester, businesses will use an average of nearly 10 software-as-a-service applications by the end of 2013. SaaS applications, as well as mobile traffic, social networks and customer channels are new integration points that will need to be captured in your business processes. 


Improving mobile device security and management with active directory

Supplied by Centrify Asia Pacific on 04 June, 2013

As more workers bring personal devices to work for increased productivity and mobile access, organisations must quickly respond to the security and compliance risks posed by unmanaged access to corporate information. IT organisations need to deploy comprehensive and cost-effective solutions that secure and manage all the devices that are part of this trend. 


HCP Anywhere: easy, secure, on-premises files sharing

Supplied by Hitachi Data Systems on 03 June, 2013

Public OFS solutions are extremely popular, and for good reasons: they are inexpensive, simple to use and provide a valuable service. However, they can also significantly increase risks to corporate data. ESG research indicates that OFS can expose organisations to security risks such as data leakage and web-based threats, among others. This paper looks at a secure and easy-to-use solution for IT. Download now. 


Server virtualisation gains momentum in small businesses, but backup adoption for virtual machines still lags

Supplied by Symantec on 21 May, 2013

Server virtualisation is no longer an up-and-coming trend - it’s an established fact of life for IT teams and their business users. And importantly, virtual servers no longer are the standard only in large enterprises. A new research survey of IT and business decision-makers at SMBs in the Asia-Pacific region points out that server virtualisation is now widely adopted among smaller organisations as well. Review the findings in this report. 


Webroot SecureAnywhere Business Endpoint Protection vs seven competitors: performance benchmark

Supplied by Webroot International Limited on 07 May, 2013

Passmark Software conducted performance testing on eight security software products during January 2013 using 13 metrics. This report presents the findings as a result of performance benchmark testing conducted for these endpoint security products.
Download this report to see how they ranked. 


Closing the circle: how to get manageable endpoint, mobile device and web security together

Supplied by Webroot International Limited on 07 May, 2013

In today’s world of employees spending hours online every day with multiple devices, we should be looking at solutions that can protect our endpoints.
This paper outlines three offerings that can be deployed independently or in combination to provide numerous security benefits. Download now. 


User-based licensing for endpoint protection and BYOD: five reasons why you should license by employee, not devices

Supplied by Webroot International Limited on 07 May, 2013

IT managers and security professionals don’t spend much time thinking about software licensing but sometimes a smarter licensing plan can simplify administration, reduce costs and improve security. A new model for endpoint and mobile device protection that licenses software by employee rather than by device is discussed here. Download this paper now. 


Delivering a secure mobile future

Supplied by Webroot International Limited on 07 May, 2013

The mobile internet revolution has truly arrived and is starting to deliver on the anytime and anywhere access that lets us take more control over our time and lives. By us demanding to use mobile technology in the workplace, IT has been left scrambling to develop mobile policies and understand how to secure all of the confidential information that will now be held on our personal mobile devices.

This paper addresses the BYOD phenomenon. 


Bandwidth bandits

Supplied by Symantec on 01 May, 2013

Internet bandwidth is a finite and expensive resource so we should protect it from spammers, hackers and time wasters. This paper looks at a service to help protect your company’s internet link from malware threats and enforce acceptable use of IT systems. 


  • All content Copyright © 2018 Westwick-Farrow Pty Ltd