Software

TechRepublic covers the latest trends in software development and implementation.

  • Research // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Sponsored By MobileIron

  • Research // Sep 2014

    Frost & Sullivan - Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market

    This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attacks and...

    Sponsored By Arbor Networks

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Sponsored By Blue Coat Systems

  • Research // Aug 2014

    Process Powered Change Management

    Deliver change with accuracy and speed. This new infographic shows how companies have achieved 50% improvement in speed and accuracy with server change management. Get more facts and insights by downloading the infographic now.

    Sponsored By HP

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Provided By Webroot

  • Research // Sep 2014

    IDC 13G Overview White Paper

    Industries have seen tremendous change in the dynamics of IT datacenters and workloads. But companies require servers that can deliver faster application performance, provide better availability to meet stringent SLAs, handle complex and evolving workloads, and maximize operational efficiency. This white paper also outlines how Dell is delivering improvements in...

    Provided By Dell and Intel®

  • Research // Sep 2014

    効果的なサーバー変更管理の秘けつ

    変更管理において主導権を握ることはきわめて重要です。許容できる変更関連インシデント発生率を達成しているのは、IT組織のうちわずか23%に過ぎません。 HPの新しい電子ブックでは、不適切なサーバー変更管理に起因するインシデント発生件数を大幅に削減する方法をご紹介しています。ぜひダウンロードしてご一読ください。

    Provided By HP

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Research // Mar 2014

    Magic Quadrant for Integrated Software Quality Suites

    Software testing is one of the key processes in the delivery of applications. The market has been steadily maturing to deliver improved user success, but technology changes such as agile practices, mobile computing and cloud platforms can disrupt vendor evaluation for testers and test managers, mainly driven by the shift...

    Provided By Access Testing

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Sep 2013

    Software License Audit: Breeze it and Beat it with Dell KACE!

    For IT professionals, software license optimization and compliance have been an ongoing dilemma – purchase too many licenses and money is wasted on unused seats or buy too few and risk audits, legal action and fines. Without a comprehensive and straightforward way to track purchased licenses against actual software usage,...

    Provided By Dell Kace

  • Research // Apr 2013

    Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care

    Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to identify drivers and challenges for developing and deploying a solution for centralized digital document delivery that complies with healthcare...

    Provided By OpenText

  • Research // Feb 2013

    Build A High-Performance Security Organization

    Companies must not only protect their organization from danger but must continue to compete in the marketplace. Companies that ignore security do so at their own risk. Read this Forrester Research Inc report to gain an understanding of what it takes to build a high performance security practice.

    Provided By IBM

  • Research // Jul 2012

    Alan Turing: A modern computing legacy

    The world would be a different place if not for Alan Turing. A mathematician and cryptographer, Turing's work at Bletchley Park heavily contributed to the Allied war effort and had profound consequences in shortening World War II. His pioneering 'stored program' computer underpins every computer today, and he has influenced...

    Provided By ZDNet

  • Research // Jul 2012

    HP Blades Leadership and Innovation for the Data Center – featuring the Magic Quadrant for Blades

    Gartner Magic Quadrants are a culmination of research in a specific market, giving you a wide-angle view of the relative positions of the market's competitors. By applying a graphical treatment and uniform set of evaluation criteria, a Gartner Magic Quadrant quickly helps you digest how well technology providers are executing...

    Provided By HP & Intel® Xeon® Processor

  • Research // Jun 2012

    SharePoint 2010: A guide to migration

    How do you take a product that is so new nobody knows much about it, and get it ready for deployment over a large organisation? Robert Schifreen faced this task when SharePoint 2010 was chosen for the University of Brighton, and he was asked to make it work. From...

    Provided By ZDNet

  • Research // Mar 2012

    IT Priorities ANZ 2011: Servers, Storage, Datacentre Report

    This paper is a subsidiary report to IT Priorities 2011, and looks in more depth than the main report at the curretn deployment and intended future deployment of a range of Server, Storage and Datacentre technologies.

    Provided By ZDNet

  • Research // Dec 2011

    IT Priorities ANZ 2011: Software and Applications

    This paper is a subsidiary report to IT Priorities 2011, and is a more in-depth look than the main report at the current deployment and intended future deployment of a range of software and applications technologies. The report focuses on the five software and applications technologies that respondents are implementing...

    Provided By ZDNet

  • Research // Nov 2011

    IT Priorities ANZ 2011 Report

    We live in interesting and challenging times. The warp speed of new technology development and adoption, the profusion of ICT service delivery models and pricing, and the volatility of global financial markets together magnify the challenges facing IT executives and practitioners. New business delivery models that extend IT systems to...

    Provided By ZDNet

  • Research // Nov 2009

    Optimize your performance with the Smart Work Advisor

    Smart Work Advisor shows how businesses can optimize their performance by providing a decision tree they can use to adapt dynamically, collaborate more effectively and connect people and processes inside and outside the organization.

    Provided By IBM

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • Research // Aug 2014

    Process Powered Change Management

    Deliver change with accuracy and speed. This new infographic shows how companies have achieved 50% improvement in speed and accuracy with server change management. Get more facts and insights by downloading the infographic now.

    Sponsored By HP

  • Research // Sep 2014

    Frost & Sullivan - Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market

    This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attacks and...

    Sponsored By Arbor Networks

  • Research // Sep 2014

    SANS Analyst White Paper: Finding Hidden Threats by Decrypting SSL

    This white paper describes the growing role SSL/TLS decryption plays in security, options for deploying decryption, and best practices for sharing the information generated by SSL/TLS decryption with other security monitoring systems.

    Sponsored By Blue Coat Systems

  • Research // Sep 2014

    Security for the Mobile First Era

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Sponsored By MobileIron

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Provided By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Provided By Imperva

  • Research // Mar 2014

    Magic Quadrant for Integrated Software Quality Suites

    Software testing is one of the key processes in the delivery of applications. The market has been steadily maturing to deliver improved user success, but technology changes such as agile practices, mobile computing and cloud platforms can disrupt vendor evaluation for testers and test managers, mainly driven by the shift...

    Provided By Access Testing

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Research // Feb 2013

    Build A High-Performance Security Organization

    Companies must not only protect their organization from danger but must continue to compete in the marketplace. Companies that ignore security do so at their own risk. Read this Forrester Research Inc report to gain an understanding of what it takes to build a high performance security practice.

    Provided By IBM

  • Research // Sep 2013

    Software License Audit: Breeze it and Beat it with Dell KACE!

    For IT professionals, software license optimization and compliance have been an ongoing dilemma – purchase too many licenses and money is wasted on unused seats or buy too few and risk audits, legal action and fines. Without a comprehensive and straightforward way to track purchased licenses against actual software usage,...

    Provided By Dell Kace

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Apr 2013

    Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care

    Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to identify drivers and challenges for developing and deploying a solution for centralized digital document delivery that complies with healthcare...

    Provided By OpenText

  • Research // Jul 2012

    HP Blades Leadership and Innovation for the Data Center – featuring the Magic Quadrant for Blades

    Gartner Magic Quadrants are a culmination of research in a specific market, giving you a wide-angle view of the relative positions of the market's competitors. By applying a graphical treatment and uniform set of evaluation criteria, a Gartner Magic Quadrant quickly helps you digest how well technology providers are executing...

    Provided By HP & Intel® Xeon® Processor

  • Research // Nov 2011

    IT Priorities ANZ 2011 Report

    We live in interesting and challenging times. The warp speed of new technology development and adoption, the profusion of ICT service delivery models and pricing, and the volatility of global financial markets together magnify the challenges facing IT executives and practitioners. New business delivery models that extend IT systems to...

    Provided By ZDNet

  • Research // Dec 2011

    IT Priorities ANZ 2011: Software and Applications

    This paper is a subsidiary report to IT Priorities 2011, and is a more in-depth look than the main report at the current deployment and intended future deployment of a range of software and applications technologies. The report focuses on the five software and applications technologies that respondents are implementing...

    Provided By ZDNet

  • Research // Mar 2012

    IT Priorities ANZ 2011: Servers, Storage, Datacentre Report

    This paper is a subsidiary report to IT Priorities 2011, and looks in more depth than the main report at the curretn deployment and intended future deployment of a range of Server, Storage and Datacentre technologies.

    Provided By ZDNet

  • Research // Jun 2012

    SharePoint 2010: A guide to migration

    How do you take a product that is so new nobody knows much about it, and get it ready for deployment over a large organisation? Robert Schifreen faced this task when SharePoint 2010 was chosen for the University of Brighton, and he was asked to make it work. From...

    Provided By ZDNet

  • Research // Jul 2012

    Alan Turing: A modern computing legacy

    The world would be a different place if not for Alan Turing. A mathematician and cryptographer, Turing's work at Bletchley Park heavily contributed to the Allied war effort and had profound consequences in shortening World War II. His pioneering 'stored program' computer underpins every computer today, and he has influenced...

    Provided By ZDNet

  • Research // Sep 2014

    効果的なサーバー変更管理の秘けつ

    変更管理において主導権を握ることはきわめて重要です。許容できる変更関連インシデント発生率を達成しているのは、IT組織のうちわずか23%に過ぎません。 HPの新しい電子ブックでは、不適切なサーバー変更管理に起因するインシデント発生件数を大幅に削減する方法をご紹介しています。ぜひダウンロードしてご一読ください。

    Provided By HP

  • Research // Nov 2009

    Optimize your performance with the Smart Work Advisor

    Smart Work Advisor shows how businesses can optimize their performance by providing a decision tree they can use to adapt dynamically, collaborate more effectively and connect people and processes inside and outside the organization.

    Provided By IBM

  • Research // Sep 2014

    IDC 13G Overview White Paper

    Industries have seen tremendous change in the dynamics of IT datacenters and workloads. But companies require servers that can deliver faster application performance, provide better availability to meet stringent SLAs, handle complex and evolving workloads, and maximize operational efficiency. This white paper also outlines how Dell is delivering improvements in...

    Provided By Dell and Intel®

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Provided By Webroot