White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Huawei High-Perfomrance Computing Cloud Solution Helps Automobile Manufacturers Embrace Industry 4.0

    White Papers // May 2017 // provided by Huawei

    The development of computing technology and the application of modern design methods in product development and testing has led great advancements in Computer Aided Engineering(CAE) emulation technology in recent years. CAE emulation has facilitated research in passive automobile security, reduced errors during the product design process, lowered costs, ...

    Download Now
  • Whitepaper: How to Stay Protected against Ransomware

    White Papers // May 2017 // provided by Sophos

    Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place ...

    Learn More
  • Internet Security Threat Report 2017 - Healthcare

    White Papers // May 2017 // provided by Symantec

    This report will provide a four pillar security framework. The framework gives a basis for assessing the maturity of your security program. Taking a preventative approach is no longer adequate for today’s threats. Read this annual report and learn the essential information to secure your systems effectively now and into ...

    Learn More
  • Internet Security Threat Report 2017

    White Papers // May 2017 // provided by Symantec

    Symantec has established one of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network,which monitors threat activity in over 157 countries and territories through a mixture of Symantec technologies. Read More to learn the latest trends on internet security.

    Read More
  • Bringing Effective Security Into Focus

    White Papers // May 2017 // provided by Cisco 

    Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex. Let’s look at the elements of complexity we have to deal with today.

    Download Now
  • Comprehensive Data Security In The Cloud

    White Papers // May 2017 // provided by Palo Alto Networks

    Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive data that is critical to business operations, reputation, longevity, and success. However, once ...

    Download Now
  • Cybersecurity Buyer's Guide

    White Papers // May 2017 // provided by Palo Alto Networks

    Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where ...

    Download Now
  • Data Breaches: Is Prevention Practical? (SANS Report)

    White Papers // May 2017 // provided by Palo Alto Networks

    SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? ...

    Download Now
  • PwC: A Security Framework for Business Leaders

    White Papers // May 2017 // provided by Palo Alto Networks

    While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders ...

    Download Now
  • NoD – Network on Demand

    Ebooks // May 2017 // provided by Alcatel - Lucent Enterprise

    A high-performance IT and network infrastructure is essential for any company. But tailoring switches, WLAN access points and network management systems exactly to requirements is an almost impossible task for an IT department, resulting in networks that are often too big and therefore too expensive. This is where Network on ...

    Learn More