Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    SDN: How It Will Affect You and Why You Should Care

    You may have heard about software-defined networking (SDN) and its cousin network functions virtualization (NFV). These emerging technologies are likely to revolutionize the IT industry as well as your job. This white paper introduces you to SDN and NFV, examines their impact on you as well as the industry, and...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Tips on Preparing for and Passing the VCP5-DCV Exam

    This paper is aimed at IT professionals who are interested in earning a VMware Certified Professional on Data Center Virtualization (VCP5-DCV) certification. It provides the benefits of having the certification, details for earning the certification, and tips for passing the exam.

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Security eBook : Identity as the New Perimeter

    This eBook provides some insights on why traditional security approaches fall short in the face of new and emerging workplace trends. Download this report and learn how CA Technologies helped organisations improved security perimeter.

    Sponsored By CA Technologies

  • White Papers // Feb 2014

    SharePlex Connector for Hadoop Improving analytics with real- and near real-time data replication

    Learn how alternative methods for replicating changes from an Oracle database to a Hadoop® cluster can help you maintain real-time or a near real-time copies of the tables your organization needs to meet its data analytics requirements in this brief from Dell™.

    Sponsored By Dell Software

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • White Papers // Jul 2014

    Protect Your Critical Web Applications with Imperva

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jan 2014

    What Smart Businesses Know About DevOps

    Smart companies use DevOps to speed the rollout and quality of new apps and services to market. See the findings from a survey of 1300 global IT leaders in this snack-sized infographic including the real benefits a good DevOps strategy can bring to your business.

    Sponsored By CA Technologies

  • White Papers // May 2014

    Real-Time Business Demo Tool

    Our interactive Real-Time Business Demo Tool demonstrates the new user experience of the SAP Business Suite software, powered by the SAP HANA platform, which delivers instant insight to all lines of business.

    Sponsored By SAP

  • White Papers // Feb 2014

    RocketSpace case study

    In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Sponsored By Coverity

  • Webcasts // Jul 2014

    5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

    Sponsored By Coverity

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Sponsored By Palo Alto Networks

  • White Papers // Jul 2014

    Evolution: Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency...

    Sponsored By IBM

  • White Papers // Jul 2014

    Building the Mobile Enterprise - A checklist for putting mobile first in your organization

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your...

    Sponsored By IBM

  • White Papers // Jul 2014

    A Successful Roadmap to Cloud

    Watch the video “Building a Successful Roadmap to the Cloud” to learn how a cloud roadmap can: Ensure that your cloud decisions work together to maximize the overall value to your business Give you greater control over security, performance, and consistency of your cloud workloads Protect...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Preparing your Network for the Mobile Onslaught

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices - which can ultimately lead to poor performance or an inflexible infrastructure. Find...

    Sponsored By IBM

  • White Papers // Jul 2014

    PCI Compliance and Mobile Devices

    The Payment Card Industry (PCI) Security Standards Council has released the Data Security Standards (DSS) version 3.0 outlining revised requirements for payment data security, effective January 1st, 2014. Merchants and Service Providers that store, process, or transmit customer payment card data must adhere to the revised outlined requirements. Additionally, the...

    Sponsored By MobileIron

  • White Papers // Aug 2014

    How Emerging Trends are Affecting Contact Centre Operations

    This whitepaper takes an in-depth look into call centres and examines how they have changed, what has influenced them and what the next move for them is. Learn how to adapt to the new trends and ensure that your customers are provided with top-of-the-line communication.

    Sponsored By ShoreTel

  • White Papers // Jul 2012

    The Active Directory Management and Security You've Always Dreamed Of

    Businesses need more from their Windows security structure – including role-based access control, automated delegation of permissions, centralized permissions reporting, and data consistency rules. A lot has changed since the introduction of the Windows NT security structure in 1993, but finding the right solution can be a challenge. Learn...

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Unchain Your Network with Application Intelligence and Control

    This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Reducing the Cost and Complexity of Endpoint Management - Report

    Discover how midsized organizations can improve endpoint security, patch compliance and lifecycle management on a limited budget.

    Sponsored By IBM

  • White Papers // Aug 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware? - Report

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for Security Intelligence & Event Management

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • Downloads // May 2014

    Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

    Sponsored By SolarWinds

  • White Papers // Aug 2014

    Case Study: Kogan.com centralises IT infrastructure with Google Apps

    Read how Kogan.com, an online retailer of consumer electronics and lifestyle goods, was able to run their business using Google Apps seeing them through significant growth. Find out more by reading our case study.

    Sponsored By Google Apps for Business

  • White Papers // Aug 2014

    Google Enterprise Solutions for Manufacturing: Become a Connected Manufacturer

    This whitepaper notes that Google Apps offers a simple, affordable option to manufacturers struggling with the complexity and cost of other systems. Read this report and learn how Google Apps for Business helps organisations improve their productivity.

    Sponsored By Google Apps for Business

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • eBooks // Oct 2013

    Finding Success In The Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Sponsored By LabTech Software APAC

  • Downloads // Jul 2014

    Download a FREE Trial of IP Address Manager from SolarWinds®!

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

    Sponsored By SolarWinds

  • eBooks // Oct 2013

    Finding Success in the Cloud

    Over the past few years, the cloud market has grown by leaps and bounds while becoming an integral part of IT operations. Cloud computing is a great way for businesses of all sizes to create collaborative environments with little investment, and it’s a profitable way for IT service providers to...

    Sponsored By LabTech Software

  • eBooks // Oct 2013

    Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    The key to achieving client satisfaction and building long-term client relationships is starting off on the right foot. It is important that the groundwork be laid in advance to ensure a smooth onboarding process, as this is the time when new clients are most critical of the work being performed....

    Sponsored By LabTech Software

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Jul 2014

    How Malware and Targeted Attacks Infiltrate Your Data Center

    Advanced targeted attacks bypass the security perimeter and compromise individuals inside your enterprise to unleash attacks on your entire network. Read this white paper to learn more about: Attack Motivation How to Protect Your Sensitive Data and Critical Business Applications Complementing Traditional Defenses with Data Center Protection Effective Malware...

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM