White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By HP // Jan 2015

    Grow your small or midsize business with a scalable network

    Small and midsize businesses need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT...

  • Sponsored By HP // Jan 2015

    Re-architect your network for BYOD

    This whitepaper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks. Download now and find out how a re-architected network- flexible and scalable- makes BYOD easier to secure and manage, yet...

  • Sponsored By HP // Jan 2015

    Magic Quadrant for Deduplication Backup Target Appliances

    Deduplication backup target appliances have played an instrumental role in reducing or eliminating tape for backup. This research will help storage professionals shortlist 11 vendors that offer such solutions.

  • Sponsored By Symantec // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

  • Sponsored By HP // Jan 2015

    Questions to Consider When Selecting an All-Flash Array

    All-flash arrays have become one of the top choices for improving storage, but with so many options out there it can be difficult to choose the right solution to fit your organisational needs. This exclusive whitepaper breaks the process down into four major categories such as performance, resiliency, efficiency, and...

  • IBM

    Sponsored By IBM // Jan 2015

    Forrester Engage Audit Professionals For Better Security Assessment Outcomes

    Read this report from Forrester Research to learn how to take advantage of your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program. Read More..

  • IBM

    Sponsored By IBM // Jan 2015

    Extreme File Transfer: Bigger, Faster, Farther

    Read this e-book from Aberdeen Group to learn about extreme file transfer, and discover the solutions that can help you send information faster, enable worldwide access, and automate workflows to drive seamless file transfer. Read More..

  • Sponsored By Symantec // Jan 2015

    Raise your Google Ranking with Symantec

    Google is becoming more sophisticated and ultimately more humanlike with every new release. Search Engine Optimization (SEO) techniques should be balanced with good user experience if they’re to form part of your business’ long term search strategy. This guide from Symantec will give you all the tips on how to...

  • Sponsored By Symantec // Jan 2015

    Always On SSL - Symantec Guide

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

  • IBM

    Sponsored By IBM // Jan 2015

    Using BlueMix to Develop Mobile Applications - Building an Android App using MobileData Cloud

    This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application. Download Now..

  • IBM

    Sponsored By IBM // Jan 2015

    Bluemix Mobile Quality Assurance: Continuous Quality for Mobile Apps - Reduce Your Time-to-Feedback

    Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development. Watch Now..

  • IBM

    Sponsored By IBM // Jan 2015

    IBM InfoSphere Guardium Vulnerability Assessment

    IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects vulnerabilities and identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers. Read More..

  • IBM

    Sponsored By IBM // Jan 2015

    Understanding Holistic Database Security

    This paper outlines 8 essential best practices that provide a holistic approach to safeguarding data from breaches and achieving compliance across distributed enterprise databases, data warehouses, file shares and Hadoop-based big data environments. Read More..

  • Sponsored By Virtual Instruments // Jan 2015

    IT Performance Management Handbook for CIOs

    Over the course of years, most operations manage to patch together all of the disparate systems that provide line-of-business support. While many organizations migrate older systems to newer solutions regularly, every business always has a mix of legacy systems that must interoperate with more modern tech. Any years-old environment is...

  • Sponsored By IBM // Jan 2015

    Forrester - Engage Audit Professionals for Better Security Assessment Outcomes

    Read this report from Forrester Research to learn how to take advantage of your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program.

  • Sponsored By MaaS360 by IBM // Jan 2015

    CITO Research: Enterprise Mobility Management Big Bang Theory

    How can IT keep up with the ever-expanding universe of mobility? Enter Enterprise Mobility Management (EMM), which encompasses all aspects of mobility that IT must secure and manage. Download this white paper to learn: How the demand for mobile security has changed What organizations of all sizes must do to...

  • Sponsored By MaaS360 by IBM // Jan 2015

    Mobile Device Management Policy Best Practices

    Do You Know the Policies to Protect Enterprise Mobility? Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves. This...

  • Sponsored By MaaS360 by IBM // Jan 2015

    Mobile Data Security: Finding the Balance

    Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience. Not all mobile security and management solutions are built alike, "Mobile Data Security: Finding the Balance" explores...

  • Sponsored By HP and Intel UK // Jan 2015

    Avoiding the Stall: Riding the Momentum of the Next Levels of Datacenter Virtualisation — A Business Value Perspective (IDC)

    This document discusses the results that more comprehensive datacenter virtualisation delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualisation. Read more... Brought to you by HP and Intel® :

  • Sponsored By HP and Intel UK // Jan 2015

    Getting The Most From Your Virtualized Data Center With Converged Systems

    In this paper, we look at the greatest challenges faced by IT departments, and how traditional processes and organizations are poorly-equipped to handle today's workplace. We discuss the benefits of converged systems that are engineered to handle virtualised workloads. Finally, we look at HP ConvergedSystem for Virtualisation as a simple...