Resource Library

Welcome to TechRepublic's Resource Library - the web's largest directory of free vendor-supplied technical content, including IT white papers, webcasts, case studies and much more. Take advantage of the library's vast resources on an array of topics, from Big Data to cloud computing, mobility to security. There's a world of knowledge at your fingertips in the Resource Library - and it's free to registered TechRepublic members.

View all white papers

  • Finding Success in the Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

  • Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    The key to achieving client satisfaction and building long-term client relationships is starting off on the right foot. It is important that the groundwork be laid in advance to ensure a smooth onboarding process, as this is the time when new clients are most critical of the work being performed....

  • Top Ten Considerations for Selecting the Right RMM Solution

    Remote monitoring and management (RMM) is an important part of your IT services offering. RMM tools enable service delivery and provide a number of benefits, including increased customer service levels, time and money savings, and ultimately a more effective and profitable business. Read this eBook for tips to ensure you...

  • Web Attack Survival Guide

    With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This white paper...

  • What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

View all white papers

  • Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

  • Fundamentals of the PKI Infrastructure

    Securing corporate information can be a challenge, considering the numerous technologies and platforms that need to be protected. One technology that definitely helps achieve secure data is public key infrastructure (PKI), which enhances the security of data by using advanced access methods and making sure the authenticity of the data...

  • Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

  • Taming the Data Beast: Integrating Systems and Applications for a Better Business

    Businesses are inundated with data from a variety of systems. Customer relationship management (CRM), point-of-sale, Web analytics, logistics, customer support and many other systems create a nearly insurmountable of data that businesses are looking to turn into actionable information. Leveraging data is difficult enough, but tracking and managing change, auditing,...

  • Achieve Deeper Network Security and Application Control (ebook)

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

View all white papers

  • HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

  • Live Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

  • Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

  • The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

  • A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

View all webcasts

  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

  • Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

  • Mastering Active Directory Migrations: Controlling Critical Issues

    Learn how the right combination of tools and processes can help to protect your core network operating system during the critical process of Active Directory migration.

  • On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

  • Webinar: A New Way to Work (Mobile)

    Mobile devices are everywhere, and every employee in your enterprise has one. In order to give employees access to the information they need, your apps must work collaboratively, on the go, and in real-time. Watch this webinar for an overview of Workday's current offerings for mobile HR and finance applications.

View all webcasts

  • Answering the Tough Question: Who Has Access to What?

    Learn from this webcast how to select specific users or groups in Active Directory (AD) and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.

  • 5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

  • On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

  • Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

View all webcasts

  • Top 10 Ways Businesses Rely on Box

    Box is a cloud platform that helps you securely store, share and manage all your company's files. Whether you need to secure confidential business information, develop a custom mobile application or are trying to simplify paper-based office processes, here are the top 10 ways enterprises rely on Box.

  • With the MobileIron Platform, Sally Beauty puts a new face on its sales team

    Seeking to increase the effectiveness of its field sales staff while helping them present a more professional image, Sally Beauty implemented the MobileIron enterprise mobility management (EMM) platform. Sally Beauty uses MobileIron to let retail and traveling sales staff access product collateral on iPads, recommend and deliver the most helpful...

  • Discovery Communications knows no boundaries with MobileIron solutions

    Discovery implemented a MobileIron enterprise mobility management (EMM) platform to enforce security policies across 2,000 iOS and Android devices, let employees complete HR and financial transactions through a secure mobile web browser, and remotely wipe corporate data from employee-owned devices after employees leave the company.

  • Philip Morris International mobilizes a global workforce with MobileIron solutions

    To support a mobile program that was rapidly growing worldwide, Philip Moris International worked with Nomasis to implement a MobileIron enterprise mobility management (EMM) platform. PMI uses MobileIron to secure corporate-issued and employee-owned devices, maintain an accurate device count across 60 countries, reset employee passcodes in seconds, and manage its...

  • Customer Success Story of Columbia Prep:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Check out this case study to learn how Columbia Prep School improved Mac user communication and productivity while reducing IT management cost with ExtremeZ-IP.

View all case studies

  • With the MobileIron Platform, Sally Beauty puts a new face on its sales team

    Seeking to increase the effectiveness of its field sales staff while helping them present a more professional image, Sally Beauty implemented the MobileIron enterprise mobility management (EMM) platform. Sally Beauty uses MobileIron to let retail and traveling sales staff access product collateral on iPads, recommend and deliver the most helpful...

  • Discovery Communications knows no boundaries with MobileIron solutions

    Discovery implemented a MobileIron enterprise mobility management (EMM) platform to enforce security policies across 2,000 iOS and Android devices, let employees complete HR and financial transactions through a secure mobile web browser, and remotely wipe corporate data from employee-owned devices after employees leave the company.

  • Philip Morris International mobilizes a global workforce with MobileIron solutions

    To support a mobile program that was rapidly growing worldwide, Philip Moris International worked with Nomasis to implement a MobileIron enterprise mobility management (EMM) platform. PMI uses MobileIron to secure corporate-issued and employee-owned devices, maintain an accurate device count across 60 countries, reset employee passcodes in seconds, and manage its...

  • Top 10 Ways Businesses Rely on Box

    Box is a cloud platform that helps you securely store, share and manage all your company's files. Whether you need to secure confidential business information, develop a custom mobile application or are trying to simplify paper-based office processes, here are the top 10 ways enterprises rely on Box.

  • Customer Success Story of Columbia Prep:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Check out this case study to learn how Columbia Prep School improved Mac user communication and productivity while reducing IT management cost with ExtremeZ-IP.

View all case studies

  • With the MobileIron Platform, Sally Beauty puts a new face on its sales team

    Seeking to increase the effectiveness of its field sales staff while helping them present a more professional image, Sally Beauty implemented the MobileIron enterprise mobility management (EMM) platform. Sally Beauty uses MobileIron to let retail and traveling sales staff access product collateral on iPads, recommend and deliver the most helpful...

  • Discovery Communications knows no boundaries with MobileIron solutions

    Discovery implemented a MobileIron enterprise mobility management (EMM) platform to enforce security policies across 2,000 iOS and Android devices, let employees complete HR and financial transactions through a secure mobile web browser, and remotely wipe corporate data from employee-owned devices after employees leave the company.

  • Philip Morris International mobilizes a global workforce with MobileIron solutions

    To support a mobile program that was rapidly growing worldwide, Philip Moris International worked with Nomasis to implement a MobileIron enterprise mobility management (EMM) platform. PMI uses MobileIron to secure corporate-issued and employee-owned devices, maintain an accurate device count across 60 countries, reset employee passcodes in seconds, and manage its...

  • Top 10 Ways Businesses Rely on Box

    Box is a cloud platform that helps you securely store, share and manage all your company's files. Whether you need to secure confidential business information, develop a custom mobile application or are trying to simplify paper-based office processes, here are the top 10 ways enterprises rely on Box.

  • Customer Success Story of Columbia Prep:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Check out this case study to learn how Columbia Prep School improved Mac user communication and productivity while reducing IT management cost with ExtremeZ-IP.

View all case studies

  • Troubleshoot Poor VoIP Call Quality

    Troubleshooting poor VoIP call quality is relatively straightforward with the right monitoring and diagnostic tools to help you identify the cause. The most likely causes include: Jitter, Latency and Packet Loss Call Signaling and Routing Misconfigured VoIP Equipment With SolarWinds® VoIP & Network Quality Manager, you can quickly...

  • Improving Customer Service with First-Class Remote Support

    Want to provide excellent customer support, while minimizing operational costs? Organizations like you are turning to remote support solutions to connect to various devices and pull system diagnostics, push configurations and view the device to deliver personalized, hands-on support. Rescue from LogMeIn, provides a sophisticated set of core...

  • Help Desk & IT Asset Management Software – Extremely Affordable & Easy-to-Use

    SolarWinds® Web Help Desk® (WHD) is a web-based help desk software that simplifies, centralizes and automates help desk management tasks including ticketing management, IT asset management, IT change management, knowledge management, incident & problem management, SLA management, & more. SolarWinds WHD provides email-to-ticket automation, dynamically assigns, routes and escalates trouble...

  • Secure FTP Server Software for Managed File Transfer & File Sharing - Extremely Affordable & Easy-to-Use

    Serv-U® Managed File Transfer (MFT) Server from SolarWinds® is an easy-to-use FTP server software that delivers security, automation, and centralized control for file transfers in your organization. Deployed within your datacenter, Serv-U MFT Server allows you to securely transfer and share files with your business partners. Serv-U MFT Server supports...

  • Easy-to-Use and Affordable Remote IT Administration and Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

View all downloads

  • V3 – Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out.

    Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out. 3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates,...

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Easy-to-Use & Affordable Remote IT Administration & Support Software

    DameWare® Remote Support (DRS) simplifies IT service management & support process by allowing IT admins to remotely connect to and troubleshoot end-user computers located both inside & outside the corporate firewall. Includes a built-in remote control tool for remote access to Windows®, Linux® & Mac OS® X computers Lets...

  • Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

  • Find the root cause of your toughest SQL Server performance issues in 4 clicks!

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

View all downloads

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

  • Download a FREE Trial of IP Address Manager from SolarWinds®!

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

  • Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

  • Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

View all downloads