Cloud computing Whitepapers


Sort by: Date | Company | Title


Evolving Threats Demand New Approaches to Security
By Akamai Technologies | 23/1/2014

As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.

Download this now


The Smart Digital Workplace: Transforming your network foundation to evolve the future of work
By Aruba Wireless Networks | 25/5/2018

THE EVOLUTION OF THE DIGITAL WORKPLACE The global workplace is shifting to an environment that fosters an interactive and collaborative relationship with its stakeholders. This new “active facility” design is quickly replacing the existing passive workplace.

Download this now


5 Step guide to effective service management
By BMC New Zealand | 27/2/2015

In the technology-enabled enterprise, business agility depends on IT agility. To adapt in real time to shifting requirements, IT has to spend less time on routine infrastructure management tasks and sharpen its focus on delivering critical business services. Find out:

  • How, by moving to the cloud and creating a service management hub for digital service innovation, business can leverage IT’s service delivery knowledge for maximum value
  • An overview on the five considerations for building a successful services hub: capabilities, integrations, visibility, the platform, and the partner
  • And why it’s time to shed the baggage of fragmented operations and processes, and embrace new expectations for a modern, innovative service hub that empowers business and IT users

Download this now


From Infrastructure to Applications: The Future of IT is On-Demand
By CA Technologies | 29/5/2014

In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.

Download this now


From Infrastructure to Applications, the Future of IT is On-Demand
By CA Technologies | 29/5/2014

In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.

Download this now


CA Technologies Strategy and Vision for Cloud Identity and Access Management
By CA Technologies | 29/5/2014

Cloud computing introduces new security challenges for both consumers and providers of cloud services across all types of IT environments. CA’s strategy and vision outlines how to securely provision users, and choose & simplify an IAM deployment models.

Download this now


IAM Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
By CA Technologies | 29/5/2014

Many organisations leverage a hybrid cloud & on-premise architecture, but one of their major challenges is ensuring users can seamlessly move around the environment while still maintaining consistent control and security policy between on-premise and cloud services.

Download this now


Securing the Mobile Cloud Connected Enterprise
By CA Technologies | 29/5/2014

The rise of mobile users and apps, coupled with the continued growth in SaaS, has transformed traditional business environments. Identity is the new perimeter. Learn what you can do with a centralized Identity Access Management (IAM) service across this hybrid IT environment.

Download this now


Who’s Minding your Cloud?
By CA Technologies | 29/5/2014

CA commissioned Ponemon Institute to survey 748 IT and IT security practitioners for the 2013 Security of Cloud Computing Users study to see how cloud security has progressed over 2 years. This Infographic will show you the results - while security is improving, lingering doubts remain.

Download this now


Guide to the TCO of Encryption
By Check Point Software Technologies | 5/9/2013

While “free” open-source applications still carry unavoidable costs of installation, management, and usage, some costs can be controlled or even eliminated by smart use of appropriate applications, management technology, and best practices. In this whitepaper, we analuse the total cost of owning, managing and using full-disk encryption in large organisations. Click to download!

Download this now
[]