Resources & Whitepapers

Listed below is a selection of technical whitepapers and other advisory notices produced by iTnews' sponsors.

These reports are available free of charge to our subscribers.

Filter by company:

Forrester Study APAC: Don’t Just Educate, Create Cybersafe Behaviour

Forrester Study APAC: Don’t Just Educate, Create Cybersafe Behaviour

Don’t just educate, create cybersafe behaviour. Get started desigining effective security awareness and training programs in APAC,
Sep 29 2022 12:54PM
Teaching Good Cyber Security Behaviors with Seinfield

Teaching Good Cyber Security Behaviors with Seinfield

Failure to deeply engage employees is the great challenge of corporate learning and training programs. And — despite the high stakes involved — security awareness training is not granted an exception.
Sep 29 2022 12:52PM
2022 State of Email Security Report

2022 State of Email Security Report

Mimecast’s sixth annual State of Email Security Report surveys over 1,400 IT leaders from 12 countries on six continents. This year’s SOES report is one of markedly increased apprehension over the dire consequences of an email-borne attack.
Sep 29 2022 12:43PM
Cyber Resilience For Dummies - ANZ edition

Cyber Resilience For Dummies - ANZ edition

Ensuring your business continuity and compliance in the age of disruption is becoming a top priority, with more and more organisations investing in cyber risk management and awareness.
Sep 29 2022 12:33PM
How to successfully plan, deploy & launch an intranet

How to successfully plan, deploy & launch an intranet

Launching an intranet is no small feat. Depending on the size of your organisation, it could take months of planning to get everything ready. It can also be tempting to bypass the planning process but, without detailed user research, you’ll waste time building features users don’t need. There are many other pitfalls too!
Sep 1 2022 10:57AM
Free eBook: Digital Transformation 101 – for banks

Free eBook: Digital Transformation 101 – for banks

How to improve CX, employee satisfaction & revenue
Aug 5 2022 1:38PM
Why financial services need to tackle their Middle Office

Why financial services need to tackle their Middle Office

In many cases the middle office has missed out on the digital transformation that has revolutionised the front-end channels and back-office functions in financial institutions… of all kinds.
Aug 5 2022 1:16PM
Learn: The latest way to transfer files between customers

Learn: The latest way to transfer files between customers

Every day, organizations exchange a considerable number of files with multiple participants. Documents, ranging from payment transactions to purchase orders, are sent to employees, remote staff, customers and trading partners.
Jul 26 2022 1:30PM
Extracting the value of data using Unified Observability

Extracting the value of data using Unified Observability

Learn: Why Observability is the essential new success driver
Jun 21 2022 4:12PM
Planning before the breach: You can’t protect what you can’t see

Planning before the breach: You can’t protect what you can’t see

How to better manage risk to protect your blindspots.
Apr 11 2022 9:03AM
Beyond FTP: Securing and Managing File Transfers

Beyond FTP: Securing and Managing File Transfers

Few managers realize the security and management risks that have blossomed in their organisation with the prevalent use of FTP.
Apr 1 2022 3:00AM
NextGen Security Operations: A Roadmap for the Future

NextGen Security Operations: A Roadmap for the Future

There’s no doubt that the security threat landscape has become increasingly complex and sophisticated. The question is no longer if an organization will be impacted by a significant crisis or disruption, but when.
Mar 29 2022 10:55AM
Video: Watch Juniper talk about its Aston Martin partnership

Video: Watch Juniper talk about its Aston Martin partnership

The iconic sports car company Aston Martin needs no introduction. Delivering high performance through precision engineering, Aston Martin has been at the forefront of using digital capabilities for most of its verticals including manufacturing and sales operations.
Mar 29 2022 10:15AM
Don’t pay the ransom: A three-step guide to ransomware protection

Don’t pay the ransom: A three-step guide to ransomware protection

Ransomware is malicious software that either encrypts your data or otherwise stops you from accessing your own systems.
Mar 14 2022 10:49AM
A Guide to Cyber Security Threat Hunting

A Guide to Cyber Security Threat Hunting

The art of proactively detecting advanced security threats.
Feb 23 2022 2:26PM
20 ways Automate solves IT and business problems

20 ways Automate solves IT and business problems

Automate provides quick-to-scale and easy-to-use automation solutions for organizations of any size.
Feb 16 2022 4:08PM
Magic Quadrant for Access Management

Magic Quadrant for Access Management

By 2025, converged IAM platforms will be the preferred adoption method for AM, IGA and PAM in over 70% of new deployments, driven by more comprehensive risk mitigation requirements.
Feb 11 2022 3:22PM
Fortinet Networking and Cybersecurity Adoption Index 2021

Fortinet Networking and Cybersecurity Adoption Index 2021

A perfect landscape for cybercriminals
Feb 1 2022 12:50PM
The 5 steps to effective data protection

The 5 steps to effective data protection

Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your file servers and document stores, not protected and unrecoverable because no one knows where to find it.
Jan 18 2022 11:08AM
Understanding the next security control points: applications and workloads

Understanding the next security control points: applications and workloads

Learn about aligning your align security strategy with the application control point.
Dec 2 2021 4:05PM

Log In

  |  Forgot your password?