The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.
Server virtualisation gains momentum in small businesses, but backup adoption for virtual machines still lagsSupplied by Symantec on 21 May, 2013
Server virtualisation is no longer an up-and-coming trend - it’s an established fact of life for IT teams and their business users. And importantly, virtual servers no longer are the standard only in large enterprises. A new research survey of IT and business decision-makers at SMBs in the Asia-Pacific region points out that server virtualisation is now widely adopted among smaller organisations as well. Review the findings in this report.
Passmark Software conducted performance testing on eight security software products during January 2013 using 13 metrics. This report presents the findings as a result of performance benchmark testing conducted for these endpoint security products.
Download this report to see how they ranked.
In today’s world of employees spending hours online every day with multiple devices, we should be looking at solutions that can protect our endpoints.
This paper outlines three offerings that can be deployed independently or in combination to provide numerous security benefits. Download now.
User-based licensing for endpoint protection and BYOD: five reasons why you should license by employee, not devicesSupplied by Webroot International Limited on 07 May, 2013
IT managers and security professionals don’t spend much time thinking about software licensing but sometimes a smarter licensing plan can simplify administration, reduce costs and improve security. A new model for endpoint and mobile device protection that licenses software by employee rather than by device is discussed here. Download this paper now.
The mobile internet revolution has truly arrived and is starting to deliver on the anytime and anywhere access that lets us take more control over our time and lives. By us demanding to use mobile technology in the workplace, IT has been left scrambling to develop mobile policies and understand how to secure all of the confidential information that will now be held on our personal mobile devices.
This paper addresses the BYOD phenomenon.
Internet bandwidth is a finite and expensive resource so we should protect it from spammers, hackers and time wasters. This paper looks at a service to help protect your company’s internet link from malware threats and enforce acceptable use of IT systems.
In Australia there is now a complex framework of legislation regulating the retention of information for various purposes. It has never been more important to ensure that an organisation’s records, including emails, are properly managed.
This paper sets out key points to ensure legal compliance.
IT administrators are responsible for the integrity, security and availability of an organisation’s email platform. Some of the most common threats to mailboxes are viruses and hardware failures, but there is another, often overlooked culprit - PST files. Allowing users to retain email messages in PST files may be a harmful threat to a mailbox’s data.
This paper outlines solutions to address this threat.
User activity auditing is the missing element that enterprises require to improve security, speed compliance and drive cost efficiencies. By quickly establishing who performed which action, a complete picture of intentions and impacts can be achieved.
Download this white paper to read about an auditing solution for compliance.
Organisations are rushing to SaaS in an effort to move business initiatives along faster than the traditional cycle. But, IT managers are realising that this adoption is part of a larger bring-your-own device trend that is playing a key role.
Download this white paper to look at a new cloud-based architecture that could help.
Devising an enterprise-wide privilege access scheme for Windows systems is complex. For Windows environments it is critical that organisations establish granular privileges quickly and efficiently to restrict administrative access to only the servers and resources required to perform a necessary job.
A solution to help in delivering secure delegation of privileged access is discussed in this paper.
It's no secret that responsibilities are growing while budgets continue to shrink. Enact these ten IT habits throughout your IT organisation to help you cut costs, create operational efficiencies and align IT to business goals.
Managing the IT infrastructure for a mid-sized company is a thankless job. People don't always understand the expertise, time and patience required. This white paper presents the top ten IT management pain points and a possible solution for making your life easier.
The data centre of 2015 will look very different from the data centre of today. To prepare for the data centre of 2015, organisations must change the way they store, govern and manage data. This paper addresses the steps organisations should take to prepare their data centre for the future. Download now.