Resources & Whitepapers

Listed below is a selection of technical whitepapers and other advisory notices produced by iTnews' sponsors.

These reports are available free of charge to our subscribers.

Filter by company:

NextGen Security Operations: A Roadmap for the Future

NextGen Security Operations: A Roadmap for the Future

There’s no doubt that the security threat landscape has become increasingly complex and sophisticated. The question is no longer if an organization will be impacted by a significant crisis or disruption, but when.
Mar 29 2022 10:55AM
Video: Watch Juniper talk about its Aston Martin partnership

Video: Watch Juniper talk about its Aston Martin partnership

The iconic sports car company Aston Martin needs no introduction. Delivering high performance through precision engineering, Aston Martin has been at the forefront of using digital capabilities for most of its verticals including manufacturing and sales operations.
Mar 29 2022 10:15AM
Don’t pay the ransom: A three-step guide to ransomware protection

Don’t pay the ransom: A three-step guide to ransomware protection

Ransomware is malicious software that either encrypts your data or otherwise stops you from accessing your own systems.
Mar 14 2022 10:49AM
A Guide to Cyber Security Threat Hunting

A Guide to Cyber Security Threat Hunting

The art of proactively detecting advanced security threats.
Feb 23 2022 2:26PM
20 ways Automate solves IT and business problems

20 ways Automate solves IT and business problems

Automate provides quick-to-scale and easy-to-use automation solutions for organizations of any size.
Feb 16 2022 4:08PM
Magic Quadrant for Access Management

Magic Quadrant for Access Management

By 2025, converged IAM platforms will be the preferred adoption method for AM, IGA and PAM in over 70% of new deployments, driven by more comprehensive risk mitigation requirements.
Feb 11 2022 3:22PM
Fortinet Networking and Cybersecurity Adoption Index 2021

Fortinet Networking and Cybersecurity Adoption Index 2021

A perfect landscape for cybercriminals
Feb 1 2022 12:50PM
The 5 steps to effective data protection

The 5 steps to effective data protection

Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your file servers and document stores, not protected and unrecoverable because no one knows where to find it.
Jan 18 2022 11:08AM
Understanding the next security control points: applications and workloads

Understanding the next security control points: applications and workloads

Learn about aligning your align security strategy with the application control point.
Dec 2 2021 4:05PM
Best security practices after rapid Digital Transformation

Best security practices after rapid Digital Transformation

iTnews has partnered with Radware to provide a free, eBook from IDC. It provides insight into the advantages of a converged application and workload security strategy as well as best practices.
Dec 1 2021 1:16PM
The CISO View 2021 Survey: Zero Trust and Privileged Access

The CISO View 2021 Survey: Zero Trust and Privileged Access

Learn about the perspectives of 100 security executives on Zero Trust and need to secure privileged access.
Nov 18 2021 4:11PM
How and why to backup your Office 365 tenant

How and why to backup your Office 365 tenant

Download this companion guide to the AvePoint backup calculator.
Nov 18 2021 3:51PM
ForgeRock for Australia’s Trusted Digital Identity Framework (TDIF)

ForgeRock for Australia’s Trusted Digital Identity Framework (TDIF)

What is TDIF and why does it matter?
Nov 12 2021 1:21PM
How engineering  has been operating in the dark and what  to do about it

How engineering has been operating in the dark and what to do about it

iTnews has partnered with Pluralsight to deliver a free eBook titled, Software Engineering: Why has it eluded data-driven management?
Nov 11 2021 4:47PM
The Top Six Digital Transformation Trends Shaping Business and Society

The Top Six Digital Transformation Trends Shaping Business and Society

Why Digital Identity Platforms are the New Imperative for Customer Identity and Access Management
Nov 10 2021 4:20PM
5 challenges to keeping application environments secure

5 challenges to keeping application environments secure

Download this Radware paper to learn about the five key challenges organisations face for securing hybrid environments.
Nov 5 2021 9:54AM
How Tomago made SAP HANA sing

How Tomago made SAP HANA sing

How the Tomago Aluminium Company optimised the cloud for business-critical workloads by working with Advent One and IBM.
Nov 2 2021 6:10PM
Save up to 10% on your public cloud costs

Save up to 10% on your public cloud costs

Improve business agility with a cloud computing solution from AMD.
Nov 1 2021 11:27AM
Build a strong foundation for security and compliance with digital document processes

Build a strong foundation for security and compliance with digital document processes

How legal professionals in APAC can support their organisations digital transformation by promoting digital document processes.
Nov 1 2021 11:09AM
The ultimate guide to customer IAM

The ultimate guide to customer IAM

Customer identity and access management (CIAM) can help you deliver the secure and seamless CX needed to win and keep customers.
Oct 21 2021 9:28PM

Log In

  |  Forgot your password?