White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • The Perimeter: An Identity Crisis

    White Papers // Aug 2017 // provided by F5

    Sixty-three percent of data breaches involve weak, default, or stolen passwords and ninety percent of today's security budgets are still spent on protecting everything but user identities and applications. This report highlights the key challenges of managing a complete identity and access solution during a time when cloud applications and ...

    Download Now
  • Breakthrough Technology Interactive eGuide

    White Papers // Aug 2017 // provided by Dell

    The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop ...

    Download Now
  • Redefine Your Workforce Enablement Through Productivity

    White Papers // Aug 2017 // provided by Dell

    Millennials are reshaping the world of work through their knowledge of new technologies, work habits, and attitudes of the 21st-century workplace. At the same time, IT departments are working to add flexibility to the way they are supporting the Millennial worker. Yet it’s not just about IT providing ...

    Download Now
  • Security for Future Ready Workforce

    White Papers // Aug 2017 // provided by Dell

    Today, technology is all about enabling the end users. Organizations of many types and sizes are developing, upgrading or replacing mobile applications to reflect changes in the workplace. Across industries, employees are working more while mobile, using multiple devices. When they return to the office, they are capitalizing on more ...

    Download Now
  • Optimize Your PC Lifecycle Management

    White Papers // Aug 2017 // provided by Dell

    Managing the PC lifecycle can be a complicated and expensive process. Organizations with outdated systems require increased support, have higher maintenance costs, and experience a loss of end user productivity. However, Dell commissioned Forrester® Consulting to study the trends and challenges for global IT decision makers in order ...

    Download Now
  • Automating for Digital Transformation: EMA Analyst Report

    White Papers // Aug 2017 // provided by IBM

    As the pace of business accelerates, business leaders are championing digital transformation initiatives that enable the continuous delivery of applications at speed and scale. This report summarizes the critical importance of automated release management tools to their success.

    Download Now
  • 2016 Cost of Data Breach Study: United States

    White Papers // Aug 2017 // provided by IBM

    Benchmark research on the global trends and costs of data breaches, sponsored by IBM Independently conducted by Ponemon Institute LLC; June 2016

    Download Now
  • DDoS Newest Minions

    White Papers // Aug 2017 // provided by F5

    The latest evolution of cyber weaponry is brought to you by the default passwords in Internet of Things (IoT) devices. That includes just about every conceivable modern electronic device—from home thermostats, lighting systems, refrigerators, cars, and water meters, to personal fitness devices, toasters, bicycle helmets, toys, and even shoes and ...

    Download Now
  • Hunt for IoT

    White Papers // Aug 2017 // provided by F5

    How in the world do Death Star-sized botnets come about? Attackers don’t possess such immense power on their own; they must commandeer it. That means they’re perpetually on the hunt for vulnerable IoT devices that they can compromise. This report uncovers who exactly is involved in the IoT hunt and ...

    Download Now
  • Application Threat Intelligence

    White Papers // Aug 2017 // provided by F5

    Cyber security has evolved in ways we never could have imagined. We have more specialized and powerful tools and services today than ever before, security budgets are slowly inching upward, and there are even glimmers of support from management. Yet, with the pace of technological change, the growing “professionalization” of ...

    Download Now