Adding Extra Security to Cloud Storage09/03/2015 Cloud, IT Systems Management, Security
Last year over a billion digital records were compromised worldwide. Today’s organisations possess information stockpiles that have immense appeal for criminal hackers. Regrettably, with the increasing sophistication and capability of the modern hacking threat, leading industry figures now appreciate it’s not a matter of 'if' a breach will occur, but 'when'.
This complimentary white paper explores the inevitability of data breach for today’s businesses, and an elegant solution to protect your sensitive data across your entire business network, both on-premise and in the cloud.
The Pitfalls of Two-Factor Authentication08/03/2015 Security
Prevent cybercriminals from identify theft and financial fraud today. Explore the shortcomings of two-factor authentication and how you can help identify the root cause of malware, phishing attacks and combat against new Trojans such as Dyre, Zeus, Citadel, Shylock and more!
This white paper explores the shortcomings of two-factor authentication, including its inability to defend against identity theft and transaction signing, as well as its negative impact on end-user experience.
Firewall Cleanup Recommendations: Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity02/03/2015 Security
The majority of all data breach incidents do not result from circumvention of advanced defensive systems and complex security controls; but from the failure of well-established systems, in particular firewalls, that have become too numerous and complex to manage effectively.
Financial Malware Explained02/03/2015 Security
Explore the lifecycle of fraudulent transactions and how to take action against emerging threats, including the tactics that cybercriminals use to infect victims’ machines, harvest credentials and execute fraudulent transactions.
Financial Services: Market Insights, Drivers and Best Practices09/02/2015
What used to be simple but effective direct relationships with banking customers and community are now harder to earn and win for Australian financial services organisations.
Using Operational Intelligence to Drive Better IT and Business Results22/01/2015 Business Processes
IT infrastructure represents one of the most important areas of investment for any financial services firm.
Breaking with Tradition in the Insurance Industry: Strategies to Insure Operational Efficiency and Future Growth20/01/2015 Business Processes
This paper describes how Business Process Management (BPM) technologies, including adaptive case management solutions and business architecture tools, can help insurance companies apply new strategies to reduce operational cost, eliminate significant streams of paperwork from their processes, imp
Case study: Multi-channel Delivery20/01/2015 Customer Experience
Banks often talk about improving their customer relationships but the National Australia Bank has delivered.
Things to consider when creating an efficient datacentre, server and telco room08/01/2015 Customer Data
A number of factors are driving the need to examine a business’ data centre efficiency. IT infrastructure and operational activities are directly impacting an organisation’s business processes more than ever before.
Information Governance is Good Business08/01/2015 Business Processes
OpenText Enterprise Information Management (EIM) White Paper Series is a set of publications from OpenText™ on the topic of Enterprise Information Management.
Large Bank Ensures Regulatory Compliance09/12/2014 Enterprise Information Management
Financial institutions like SMBC have been challenged with meeting increasingly stringent regulatory requirements designed to protect investors and ensure financial stability, accountability, and transparency. Customer data and management needs to meet such requirements.
Forrester Wave Report: Global BYOD Management Services, courtesy of Tangoe08/12/2014
BYOD is an inevitable part of your workforce strategy and that companies must prepare for its spread across their organisations.
How to Transform your Data Centre from Basic to Strategic04/12/2014
In today’s data driven world, data centre managers need to hold down operational costs, improve energy efficiency and optimise capacity – all while maintaining network availability and reliability.
Modern Threats Need Modern Threat Prevention02/12/2014 Security
The desire to prevent threats from viruses, bots and software vulnerabilities creates a need for a solution that can mitigate multiple threats all at once. A unified approach is needed to provide effective coverage and ease the work of the IT security team.
Detecting Insider Threats: How Splunk Software is Used to Safeguard Financial Data26/11/2014 Security
Financial institutions increasingly rely on outside contractors to program and maintain applications, manage projects, and perform analyses and assessments. Unfortunately, whether intentionally or not, these contract employees can pose a serious insider threat.