Resource Library

Welcome to TechRepublic's Resource Library - the web's largest directory of free vendor-supplied technical content, including IT white papers, webcasts, case studies and much more. Take advantage of the library's vast resources on an array of topics, from Big Data to cloud computing, mobility to security. There's a world of knowledge at your fingertips in the Resource Library - and it's free to registered TechRepublic members.

  • Webroot® Mobile Threat Report

    Webroot believes that users and system administrations should be armed with the most up-to-date information on the risks and security issues currently facing the deployment and use of mobile devices. As employees continue to employ their own devices for work purposes, greater threats are introduced into the workplace leaving company...

  • Webroot® Threat Brief

    New viruses, and updated versions of existing viruses, are released daily, even hourly. Because of this, signature-based threat detection cannot be effective. Instead, Internet security solutions such as Webroot's SecureAnywhere solutions that use behavioural detection are necessary. Read this Whitepaper to find out why.

  • PassMark Software®: Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the...

  • Harvard Business Review: The Truth About Customer Experience

    Companies have long emphasized touchpoints - the many critical moments when customers interact with the organization and it's offerings on their way to purchase and after. But the narrow focus on maximizing satisfaction at those moments can create a distorted picture, suggesting that customers are happier with the company than...

  • U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

View all white papers

  • IDC Market Scape: Worldwide Datacenter Infrastructure Management 2013 Vendor Analysis

    The latest IDC MarketScape Report names the Trellis™ platform a leader for capabilities and future strategy. International Data Corporation (IDC) recognized Emerson as a leading vendor of data center infrastructure management (DCIM) software solutions in its Worldwide Datacenter Infrastructure Management 2013 Vendor Analysis.

  • Cloud email migration, your questions answered. A Gartner Analyst review

    A video bought to you by, Matt Cain, Research Vice President at Gartner and Mounil Patel, Vice President of Field Enablement from Mimecast. This short video looks at some of the key questions and answers around email migrations whether it be to the latest Exchange server, Office 365 or a...

  • 6 Secrets to Offering Exceptional Customer Service

    The vast majority of people are not experiencing great service. Nearly a third of consumers believe that businesses are now paying less attention to providing good customer service. On top of that, just 7% of those polled say that customer service experiences they have with companies typically exceed their...

  • Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

  • ZDNet ANZ IaaS / PaaS Priorities 2013/14

    The Infrastructure-as-a-Service and Platform-as-a-Service strategies, priorities and implementation plans of ANZ IT leaders and professionals Part of ZDNet's Cloud Priorities research project, ZDNet IaaS/PaaS Priorities reports the findings of a survey about the cloud priorities and implementation plans of IT and business leaders in Australia and New Zealand. ...

View all white papers

  • SPSS Stastics White Paper: The Risk of Using Spreadsheets for Statistical Analysis

    While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they’re not designed to perform, or for a task beyond the limit of their capabilities, using spreadsheets can be risky. Read this paper to learn about more powerful yet...

  • Profit Magazine: Everything You Know About Sales is Wrong

    Everything You Know About Sales is Wrong. Daniel Pink, author of the book, To Sell Is Human unveils the secrets to selling - what makes sales people tick and the traits that make the best sellers successful in today’s marketplace.

  • Cyber Security Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

  • Forrester Study: Total Economic Impact of Google Apps for Business

    Forrester Consulting has performed a total economic impact (TEI ) analysis, commissioned by Google, for organizations considering switching to Google Apps for Business from a traditional, on-premise environment for messaging and collaboration. In a study entitled "The Total Economic Impact of Google Apps for Business", the research and advisory firm...

  • Systems Engineering for Dummies

    This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products. If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for...

View all white papers

  • Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

  • Customers on CommVault - LWG Consulting Deployment

    Paul Slager from LWG will discuss how he is achieving the following amazing results by leveraging the singular Simpana software solution from CommVault to deliver deeply integrated application-aware backup, archive and replication that spans physical and virtual environments: Reduce backup times by over 400%, recover VMs in under 10 minutes,...

  • Testimonial: State of Colorado

    Watch Todd Olson discuss his company's experiences with the CommVault Consulting and Professional Services teams.

  • Snapshot Management – Ask the Educator Series

    Want a first-hand look at how easy it is to enhance and simplify snapshot backup? For a detailed technical tour and demonstration of Simpana IntelliSnap Technology, view this Ask the Educator session from CommVault Technical Instructor, Eric Mars.

  • Live Webcast: How to Simplify Deployment of Google Apps and Office 365

    Google Apps and Microsoft Office 365 each has its own vast ecosystem, from email to office applications to identity management. Google would prefer you live entirely in the Google environment, while Microsoft would prefer you live entirely in its Exchange/Office 365/Active Directory infrastructure. You are likely using a combination of...

View all webcasts

  • Live Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

  • On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of, and Only Influencers, has his finger on the pulse of what’s happening in email today....

  • Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

  • Live Webcast: Moments of Magic in Customer Service

    Join us for this LIVE event! Thursday, April 24th 10:00 AM PDT / 1:00 PM EDT There’s a big difference between satisfied customers and loyal customers. Satisfactory is a rating, while loyalty is an emotion. The goal is to deliver a customer service experience that gives people a...

  • IBM OnDemand Webcast - Boost performance & profitability with better planning & mobile reporting

    See how Ashurst, a top-tier legal service provider for private and public sector clients worldwide, was able to effectively manage organizational change and improve profitability using IBM Business Analytics.

View all webcasts

  • On-demand Webcast - ZDNet's Cloud Priorities 2014

    ZDNet’s Cloud Priorities 2014 webcast, sponsored by Windstream, will debut findings from a research study we conducted among our readers on cloud computing in North America. Our own Bill Detwiler, managing editor of Tech Pro Research, will share key findings from the study and discuss the most ground-breaking cloud trends....

  • On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

  • On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of, and Only Influencers, has his finger on the pulse of what’s happening in email today....

  • Answering the Tough Question: Who Has Access to What?

    Learn from this webcast how to select specific users or groups in Active Directory (AD) and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.

  • On-demand Webcast: Overcoming the challenges of multifactor authentication

    Many cloud service providers are rolling out two-factor authentication features to address the increasing challenges that come from relying on passwords alone to secure user access and company data. Multifactor authentication is a great step towards stronger security and access management. Unfortunately, for enterprises that leverage more than a...

View all webcasts

  • Acxiom Case Study

    This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity with the CommVault Edge software.

  • SIAC Case Study

    Learn about how SIAC Construction Group was able to increase productivity and efficiency with CommVault’s Intelligent Archive, Self-Service Access and eDiscovery.

  • Texas Tech University

    The Texas Tech University System was utilizing a decentralized backup and recovery approach that badly needed to be replaced with a consolidated infrastructure. Find out how Simpana software’s embedded deduplication cost up to 70 percent less than competing hardware solutions and enabled Texas Tech to reduce backup media and storage...

  • TicketNetwork Selects Imperva SecureSphere to Secure Transactions

    Over 7.5 million tickets are offered on TicketNetwork's online ticket exchange every day. To protect the organization’s website and address PCI compliance, TicketNetwork chose the Imperva SecureSphere Web Application Firewall because of its high performance, its ease-of-management and its reputation-based security provided by ThreatRadar. This case study highlights why TicketNetwork...

  • A broadband company streamlines its recovery processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

View all case studies

  • MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

  • Cloud Services for Dummies eBook

    For business leaders, cloud computing is a cost-effective way to leverage IT resources to prototype and implement strategic change. For your IT organization, the cloud allows it to be significantly more proactive and responsive when it comes to supporting strategic business imperatives. Learn how to take advantage of IaaS and...

  • Customer Success Story of Columbia Prep:

    ExtremeZ-IP is helping thousands of educational institutions worldwide conquer their Mac/Windows integration challenges. Check out this case study to learn how Columbia Prep School improved Mac user communication and productivity while reducing IT management cost with ExtremeZ-IP.

  • Case Study: Cincinnati Zoo and Botanical Garden

    The Cincinnati Zoo & Botanical Garden is one of the nation's most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent's Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000...

  • Case Study: Meka Pro harnesses analytics to improve profitability of manufacturing projects

    To operate effectively in different markets, Finnish manufacturer Meka Pro needed to be able to adjust its pricing and manufacturing strategies to each locality, but had no insight into their own data. Read this case study to learn how Meka Pro used IBM® Cognos® software modules to make faster, better...

View all case studies

  • Quadmark: A case study on switching to Google Apps

    Read how Quadmark, the global consulting and training organisation, with over 100 employees globally embarked on a rebranding and expansion plan including a streamline of IT infrastructure. This included switching it’s email server from Exchange to Gmail and adopting Google Apps.

  • The Successful Cloud Enabled Enterprise - Your Journey to the Cloud Infopaper

    It’s no secret that more and more businesses are leveraging the power of the cloud. And there’s good reason for that. Cloud computing offers the promise of cost-effective capacity on demand—anytime, anywhere, and on any device. But taking advantage of the cloud’s many benefits isn't as simple as signing...

  • HP: Risky business: why business leaders must take action on Windows XP?

    This ZDNet and TechRepublic guide, in association with HP, looks at what's at stake for those who're still on XP, explains some of the threats, and offers options to help the risk-exposed take action to protect their business.

  • Quadmark - A case study on switching to Google Apps for Business

    Read how Quadmark, the global consulting and training organisation, with over 100 employees globally embarked on a rebranding and expansion plan including a streamline of IT infrastructure. This included switching it’s email server from Exchange to Gmail and adopting Google Apps for Business.

  • Comparative Guide: Hitachi Unified Storage VM

    IT decision-makers often struggle to achieve a balanced information infrastructure that meets all their needs. Historically, they have chosen between low initial costs and higher efficiencies or market advantages. A platform that combines enterprise virtualization, data unification and efficient packaging enables businesses to extract increasing value from their data for...

View all case studies

  • Dameware - Provide secure remote support to end-users located anywhere in the world.

    With DameWare Remote Support you can: Support end-users and computers located both inside & outside your firewall Remotely control the desktop of Windows®, Mac OS X® and Linux computers Take advantage of extensive security and encryption capabilities, including multiple authentication methods Centrally manage shared host lists, users & administrators,...

  • SolarWinds Server & Application Monitor (SAM) Offers Easy Exchange Mailbox Management with NEW AppInsight™ for Exchange!

    SolarWinds Server & Application Monitor provides extensive capabilities to monitor and fix your servers and applications, including custom application monitoring. With AppInsight for Exchange, SAM provides expert alerts and advice along with comprehensive visibility to proactively pinpoint Exchange performance issues. Find & fix problems with Microsoft® Exchange & other...

  • Comprehensive Virtualization Management - From VM to Spindle

    SolarWinds Virtualization Manager delivers integrated VMware & Microsoft Hyper-V capacity planning, performance monitoring, VM sprawl control, configuration management, & chargeback automation. All in one awesomely affordable product that’s easy to download, deploy, and use. Virtualization Manager auto-discovers the virtual machines in your environment making the creation of your monitoring environment...

  • Business Essential: Complimentary Vulnerability Scan

    This complimentary security scanner searches for endpoint vulnerabilities, including misconfigurations, missing patches, open services and backdoors. Run the scan to receive a detailed report so you can address security vulnerabilities before they become a problem. Find out if your endpoints are secure. Try this FREE vulnerability scanner now.

  • Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Do you want a unified view of IT systems performance, availability and capacity across all server platforms, network devices, applications, and IT business services? Unified, enterprise-level monitoring, alerting and reporting across all Servers, Networks, Applications, and IT services. Easy to use and quick to deploy. up.time can...

View all downloads

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Download a FREE Trial of SolarWinds Server & Application Monitor!

    Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out. 3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates,...

  • Hadoop for the enterprise: quick, easy, free.

    InfoSphere BigInsights Quick Start Edition combines the power of Hadoop with enterprise-grade features including visualization & exploration, advanced analytics, and security & administration. Download the free Quick Start now.

  • IBM Worklight Developer Edition

    IBM® Worklight is an open, comprehensive, and advanced mobile application platform that helps organizations extend their business to mobile devices. Try it today.

  • IBM Security AppScan

    IBM® Security AppScan® enables organizations to assess the security of their applications and achieve regulatory compliance by identifying vulnerabilities and generating reports with intelligent fix recommendations to ease remediation.

View all downloads

  • AppAssure 5 Trial

    Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. It offers a variety of flexible recovery options so you can retrieve your data quickly, whether it resides on physical or virtual servers, or in the cloud.

  • Intel® Advisor XE 2013

    This breakthrough threading prototyping tool simplifies data-driven threading design for C, C++, C#, and Fortran application architects. Quickly prototype multiple threading designs and compare the projected performance scaling and synchronization issues. Evaluate design alternatives before investing in implementation and without disrupting product development and release cycles. Select the design with...

  • Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

  • Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

  • Financials - Killing your Business

    Today’s CFOs are strapped with old systems that are inflexible and holding back their business. It’s no surprise that innovative CFOs are finding freedom with cloud-based financial management applications. See the infographic to learn how CFOs are transforming their organizations in the cloud.

View all downloads