Case Studies

TechRepublic's Resource Library offers the web's largest collection of free vendor-supplied technical case studies. Offering in-depth analysis on an array of IT and business topics, from Big Data to cloud computing, collaboration to enterprise software, mobility to security.

Case Studies by Topic

  • Sponsored By HP // Jul 2014

    E-Guide: HP Case Studies

    Read this E-Guide to learn how wih new HP Officeject Pro X devices, you can meet your targets for saving energy and cut total print costs by around 50 per cent.

  • Sponsored By LogMeIn // Jul 2014

    Case Study: LogMeIn Rescue and Rice Toyota

    As Rice Toyota has grown, so has its dependence on computer applications and systems to deliver a high level of customer service and customer satisfaction. With more than 180 employees using computers to access applications in four buildings, Rice’s small IT department was increasingly challenged to resolve user support issues...

  • Sponsored By IBM // Jul 2014

    Cincinnati Zoo transforms customer experience and boosts profits

    The Cincinnati Zoo & Botanical Garden is one of the nation's most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent's Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000...

  • Sponsored By Polycom, Inc. // Jul 2014

    A Forrester Total Economic Impact Case Study

    Forrester Research conducted a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. Download this case study to understand the framework for evaluating the potential financial impact of Polycom voice solutions within their organizations....

  • Sponsored By IBM // Apr 2014

    Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download this Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based acces.

  • Sponsored By IBM // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

  • Sponsored By CommVault Systems // Apr 2014

    SIAC Case Study

    Learn about how SIAC Construction Group was able to increase productivity and efficiency with CommVault’s Intelligent Archive, Self-Service Access and eDiscovery.

  • Sponsored By CommVault Systems // Apr 2014

    Acxiom Case Study

    This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity with the CommVault Edge software.

  • Sponsored By CommVault Systems // Apr 2014

    Texas Tech University

    The Texas Tech University System was utilizing a decentralized backup and recovery approach that badly needed to be replaced with a consolidated infrastructure. Find out how Simpana software’s embedded deduplication cost up to 70 percent less than competing hardware solutions and enabled Texas Tech to reduce backup media and storage...

  • Sponsored By IBM // Apr 2014

    A broadband company streamlines its recovery processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

  • Sponsored By IBM // Apr 2014

    Under Cloud Cover: How leaders are accelerating competitive differentiation

    According to a survey by the IBM Center for Applied Insights and Oxford Economics, business leaders are becoming increasingly focused on the business value of cloud. Although the participant’s cloud strategies differ in terms of scope, platform and delivery models, the chief takeaway from the survey is that cloud is...

  • Sponsored By IBM // Apr 2014

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

  • Sponsored By IBM // Apr 2014

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

  • Sponsored By IBM // Apr 2014

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

  • Sponsored By IBM // Apr 2014

    Forrester Report: Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren't enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

  • Sponsored By IBM // Apr 2014

    Building a Security Incident Response Plan

    Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these...

  • Sponsored By IBM // Apr 2014

    Putting Mobile First - Best Practices

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise?

  • Sponsored By IBM // Apr 2014

    IBM Security Services Cyber: Security Intelligence Index

    An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events...

  • Sponsored By IBM // Apr 2014

    Forrester Report: Bring ROI to your BYOD

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

  • Sponsored By IBM // Apr 2014

    Preparing your Network for the Mobile Onslaught

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices - which can ultimately lead to poor performance or an inflexible infrastructure. Find...