White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Redefining Connections: Insights from the Global C-suite Study – The CIO Perspective

    White Papers // May 2017 // provided by IBM

    CIOs know they need to prepare for a future in which disruption is pervasive: a future in which technological advances are blurring the distinctions between different industries and new competitors are emerging from left field. So how can they generate the insights their organizations will need to thrive in this ...

    Learn More
  • Whitepaper: How to Stay Protected against Ransomware

    White Papers // May 2017 // provided by Sophos

    Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place ...

    Learn More
  • Internet Security Threat Report 2017 - Healthcare

    White Papers // May 2017 // provided by Symantec

    This report will provide a four pillar security framework. The framework gives a basis for assessing the maturity of your security program. Taking a preventative approach is no longer adequate for today’s threats. Read this annual report and learn the essential information to secure your systems effectively now and into ...

    Learn More
  • Internet Security Threat Report 2017

    White Papers // May 2017 // provided by Symantec

    Symantec has established one of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network,which monitors threat activity in over 157 countries and territories through a mixture of Symantec technologies. Read More to learn the latest trends on internet security.

    Read More
  • Huawei High-Perfomrance Computing Cloud Solution Helps Automobile Manufacturers Embrace Industry 4.0

    White Papers // May 2017 // provided by Huawei

    The development of computing technology and the application of modern design methods in product development and testing has led great advancements in Computer Aided Engineering(CAE) emulation technology in recent years. CAE emulation has facilitated research in passive automobile security, reduced errors during the product design process, lowered costs, ...

    Download Now
  • Bringing Effective Security Into Focus

    White Papers // May 2017 // provided by Cisco 

    Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex. Let’s look at the elements of complexity we have to deal with today.

    Download Now
  • Discover the value of email delivery

    White Papers // May 2017 // provided by OpenText

    Ensuring deliverability of e-mails containing bills, statements, and other business critical information is imperative. Many businesses trust their customer communications management (CCM) platform for this. Nevertheless, they are often not aware of the complexity involved in getting these communications to the customer’s inbox or the impact of poor deliverability. This ...

    Download Now
  • Comprehensive Data Security In The Cloud

    White Papers // May 2017 // provided by Palo Alto Networks

    Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive data that is critical to business operations, reputation, longevity, and success. However, once ...

    Download Now
  • Cybersecurity Buyer's Guide

    White Papers // May 2017 // provided by Palo Alto Networks

    Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where ...

    Download Now
  • Data Breaches: Is Prevention Practical? (SANS Report)

    White Papers // May 2017 // provided by Palo Alto Networks

    SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? ...

    Download Now