White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By White AU: McAfee/Intel // Oct 2014

    Blog Article: “Powering the Evolution of Security Connected”

    Using a multitude of technological innovations, McAfee® Threat Intelligence Exchange (TIE) closes the gap between encounter to containment of advanced targeted attacks. What has traditionally taken days, weeks or months now only takes milliseconds. Read why everyone is talking about McAfee’s new TIE here.

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study- Australia

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in Australia.

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study-India

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in India.

  • Sponsored By IBM // Oct 2014

    Gartner Magic Quadrant: Global Managed Security Services

    Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. This Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute"...

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study Sponsored by IBM - Global Analysis

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations.It answers critical questions such as: How much can a data breach cost? And are you doing enough to prevent it from happening to you?

  • Sponsored By EMC // Oct 2014

    Operationalizing Excellence in Global Regulatory Process

    As life sciences companies face expiring patents and shrinking drug-development pipelines, it’s never been more important to streamline the regulatory submissions process and get products to market faster. But to date, most systems for authoring, managing and submitting regulatory documents have had serious limitations in key areas for regulatory submissions...

  • Sponsored By EMC // Oct 2014

    A 15-minute guide for life sciences and manufacturing organisations

    By unifying, simplifying and automating the management of controlled documents, your organisation can create efficient, flexible and most importantly compliant manufacturing operation that increases product quality and productivity and prevents remediation, consent decrees and product recalls.

  • Sponsored By EMC // Oct 2014

    Obtain a 360-degree view of regulatory activity

    Are you having a hard time finding and keeping track of your organisation’s growing volume of electronic submissions and regulatory correspondence? You’re not alone. Efficient access to archived submissions, along with their associated correspondence, has become a challenge that almost every life sciences firm grapples with.

  • Sponsored By HP // Oct 2014

    Lower Risk and Cost with Proactive Information Governance

    Read this white paper to find out how you can help ensure your data assets are available, protected, and managed through their lifecycle by applying proactive information governance for: Organization Location And control

  • Sponsored By White AU: McAfee/Intel // Oct 2014

    TIE Webinar – Turning the Tables on Cyber-Attacks - 6 November 2014

    Thursday 6th November 2014 Every day organisations – just like yours – fall victim to data theft through advanced targeted attacks. The costs of data breaches and remediation are extremely high, particularly when it comes to your company/client records and the devastating loss in consumer confidence. What if you could...

  • Sponsored By EMC // Oct 2014

    Using Information Intelligence to Improve Projects in the Energy Sector

    In the energy industry, successful execution of projects in the design, construction, and operation of plants and facilities is dependent on more than ensuring that schedules and budgets are met. Management of the asset life cycle from planning all the way through to decommissioning requires systems and tools that support...

  • Sponsored By EMC // Oct 2014

    Learn the four stages to operational excellence

    The key to effective management is having the right information at your disposal. It does little good to have an “as-designed” document in your hands when there’s a more accurate “as-built” document that you can’t locate. When information is missing mistakes are made.

  • Sponsored By EMC // Oct 2014

    Addressing key issues for managers of complex contracts in energy and engineering

    Contract and project management is a significant challenge in the energy and engineering industries. Supplier Exchange will allow participants to define workflows and collaboration methods that improve contract management by greatly reducing the time and cost to find and validate relevant information.

  • Sponsored By EMC // Oct 2014

    Using Document Control to Keep Your Projects on Track

    In the past, collecting, distributing and tracking documents has been time consuming and inefficient process. Finding the right document for a transmittal can mean digging through hundreds of emails of untold numbers of shared files. Fortunately there is an easier way.

  • Sponsored By EMC // Oct 2014

    Managing Assets for Maximum Performance and Value

    State-of-the-art asset management is critical in industries such as oil and gas exploration and production, oil refining and gas processing, and utilities that rely heavily on expensive and aging physical assets. Among other benefits, effective asset management reduces costs and risks, improves process flows and business continuity, increases profit margins,...

  • Sponsored By IBM // Oct 2014

    Virtualizing DR using Cloud : Protect your Applications Quickly With a Resilient Cloud

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

  • Sponsored By FireEye // Oct 2014

    Cybersecurity's Maginot Line

    This report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures alone. Security teams must be able to see the alerts that matter. And they must complement those with rapid endpoint response expertise to confirm and contain attacks as...

  • Sponsored By FireEye // Oct 2014

    Mandiant 2014 Threat Report

    Cyber threat actors are expanding the uses of computer network exploitation to fulfil an array of objectives, from the economic to the political. Private organizations have increasingly become collateral damage in political conflicts. With no diplomatic solution in sight, the ability to detect and respond to attacks has never been...

  • Sponsored By FireEye // Oct 2014

    FireEye Advanced Threat Report

    The data contained in this report comes from the FireEye® Dynamic Threat Intelligence™ (DTI) cloud, which provides attack metrics shared by FireEye customers across the globe. It offers strong evidence that malware infections occur within enterprises at an alarming rate. It also shows that advanced attackers can penetrate legacy defences...

  • Sponsored By EMC // Oct 2014

    Learn how to make archiving an enterprise advantage: eBook

    Digital information is the lifeblood of the enterprise. Every day, business applications generate invoices, account statements, voice recordings and many other forms of information that must be preserved for business and regulatory purposes. More often than not, this information is inactive and stored in legacy applications that have been replaced...