White Papers/Resources
The Technology Decisions Resource Library contains white papers, eBooks, webcasts, videos and technical papers to help you manage and solve work related problems. Select from a variety of application and technology related subjects, supplied by market-leading vendors or written by our editorial team.
The inevitable extinction of PSTs
Supplied by Symantec on 01 May, 2013
IT administrators are responsible for the integrity, security and availability of an organisation’s email platform. Some of the most common threats to mailboxes are viruses and hardware failures, but there is another, often overlooked culprit - PST files. Allowing users to retain email messages in PST files may be a harmful threat to a mailbox’s data.
This paper outlines solutions to address this threat.
Privileged user activity auditing: the missing link for enterprise compliance and security
Supplied by Centrify Asia Pacific on 18 April, 2013
User activity auditing is the missing element that enterprises require to improve security, speed compliance and drive cost efficiencies. By quickly establishing who performed which action, a complete picture of intentions and impacts can be achieved.
Download this white paper to read about an auditing solution for compliance.
Stop password sprawl with SaaS single sign-on via active directory
Supplied by Centrify Asia Pacific on 18 April, 2013
Organisations are rushing to SaaS in an effort to move business initiatives along faster than the traditional cycle. But, IT managers are realising that this adoption is part of a larger bring-your-own device trend that is playing a key role.
Download this white paper to look at a new cloud-based architecture that could help.
Windows least privilege management and beyond
Supplied by Centrify Asia Pacific on 18 April, 2013
Devising an enterprise-wide privilege access scheme for Windows systems is complex. For Windows environments it is critical that organisations establish granular privileges quickly and efficiently to restrict administrative access to only the servers and resources required to perform a necessary job.
A solution to help in delivering secure delegation of privileged access is discussed in this paper.
Top ten IT systems management pain points
Supplied by Kaseya on 04 April, 2013
Managing the IT infrastructure for a mid-sized company is a thankless job. People don't always understand the expertise, time and patience required. This white paper presents the top ten IT management pain points and a possible solution for making your life easier.
Ten effective habits of indispensable IT departments
Supplied by Kaseya on 04 April, 2013It's no secret that responsibilities are growing while budgets continue to shrink. Enact these ten IT habits throughout your IT organisation to help you cut costs, create operational efficiencies and align IT to business goals.
Create the data centre of 2015
Supplied by Hitachi Data Systems on 21 March, 2013The data centre of 2015 will look very different from the data centre of today. To prepare for the data centre of 2015, organisations must change the way they store, govern and manage data. This paper addresses the steps organisations should take to prepare their data centre for the future. Download now.
Smarter Cloud Storage Solutions: an eGuide
Supplied by IBM Australia Limited on 19 March, 2013Comprising three white papers from leading analyst firms, this eGuide will help save money and improve the effectiveness of your cloud storage architecture.
Eliminate shortcomings in your cloud architecture with smarter storage
Supplied by IBM Australia Limited on 05 March, 2013
Enterprises are deploying private and hosted clouds to respond faster to business demands for new applications, to improve service levels and to reduce cost across the data centre.
Application fluency for a high-quality user experience
Supplied by Alcatel Lucent on 31 October, 2012
Today the new converged enterprise network must be fluent in a variety of applications to deliver a high-quality, end-user experience. It must be engineered to remove the communications barriers imposed on users by siloed access networks and fragmented network services.
Bring your own device (BYOD): managing the chaos
Supplied by SolarWinds Software Asia Pte Ltd on 31 October, 2012
Enterprise computing is shifting with the diffusion of the BYOD (bring your own device) phenomenon - the latest trend where employees use their own personal devices to access work applications. While this may increase employee satisfaction, it can be a challenge for IT departments.
Unified communications eBook
Supplied by Westwick-Farrow Pty Ltd on 22 August, 2012
Unified communications (UC) has many potential benefits for organisations, including cost savings through the use of IP telephony as well as streamlined communications between staff members and customers. This eBook features several articles on emerging movements in UC - download now!