White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By White AU: McAfee/Intel // Oct 2014

    Blog Article: “Powering the Evolution of Security Connected”

    Using a multitude of technological innovations, McAfee® Threat Intelligence Exchange (TIE) closes the gap between encounter to containment of advanced targeted attacks. What has traditionally taken days, weeks or months now only takes milliseconds. Read why everyone is talking about McAfee’s new TIE here.

  • Sponsored By NetSuite AU // Oct 2014

    The Evolving Role of the Controller

    The role of the financial controller is changing in ways that mirror those of the broader finance function. Organizations will need to be aware of the changing role of senior finance professionals, the increasing demand for their time and services, the skill set they must possess, and how to fill...

  • Sponsored By NetSuite AU // Oct 2014

    How TCO Benefits Make Cloud Computing a No Brainer

    A detailed TCO evaluation shows cloud-based solutions can deliver significant savings compared to on-premises business applications. NetSuite analysed the economic benefits of the cloud model in the ERP and CRM space by comparing the TCO of NetSuite's SaaS-based ERP and CRM solution with that of on-premises solutions from vendors such...

  • Sponsored By NetSuite AU // Oct 2014

    Buyer's Guide to CRM Solutions

    Industry-Driven Insights into Trends, Value and Evaluation Criteria for any decision-maker - including sales, service, marketing and IT executives - evaluating a customer relationship management (CRM) or sales force automation (SFA) project.

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study- Australia

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in Australia.

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study-India

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in India.

  • Sponsored By IBM // Oct 2014

    Gartner Magic Quadrant: Global Managed Security Services

    Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. This Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute"...

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study Sponsored by IBM - Global Analysis

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations.It answers critical questions such as: How much can a data breach cost? And are you doing enough to prevent it from happening to you?

  • Sponsored By EMC // Oct 2014

    Operationalizing Excellence in Global Regulatory Process

    As life sciences companies face expiring patents and shrinking drug-development pipelines, it’s never been more important to streamline the regulatory submissions process and get products to market faster. But to date, most systems for authoring, managing and submitting regulatory documents have had serious limitations in key areas for regulatory submissions...

  • Sponsored By EMC // Oct 2014

    A 15-minute guide for life sciences and manufacturing organisations

    By unifying, simplifying and automating the management of controlled documents, your organisation can create efficient, flexible and most importantly compliant manufacturing operation that increases product quality and productivity and prevents remediation, consent decrees and product recalls.

  • Sponsored By EMC // Oct 2014

    Obtain a 360-degree view of regulatory activity

    Are you having a hard time finding and keeping track of your organisation’s growing volume of electronic submissions and regulatory correspondence? You’re not alone. Efficient access to archived submissions, along with their associated correspondence, has become a challenge that almost every life sciences firm grapples with.

  • Sponsored By HP // Oct 2014

    Lower Risk and Cost with Proactive Information Governance

    Read this white paper to find out how you can help ensure your data assets are available, protected, and managed through their lifecycle by applying proactive information governance for: Organization Location And control

  • Sponsored By White AU: McAfee/Intel // Oct 2014

    Free Webinar - Turn the Tables on Cyber-Attacks

    Every day organisations – just like yours – fall victim to data theft through advanced targeted attacks. The costs of data breaches and remediation are extremely high. What if you could turn the tables on cyber-attacks by allowing your products to operate as one, exchanging and acting on collective threat...

  • Sponsored By EMC // Oct 2014

    Using Information Intelligence to Improve Projects in the Energy Sector

    In the energy industry, successful execution of projects in the design, construction, and operation of plants and facilities is dependent on more than ensuring that schedules and budgets are met. Management of the asset life cycle from planning all the way through to decommissioning requires systems and tools that support...

  • Sponsored By EMC // Oct 2014

    Learn the four stages to operational excellence

    The key to effective management is having the right information at your disposal. It does little good to have an “as-designed” document in your hands when there’s a more accurate “as-built” document that you can’t locate. When information is missing mistakes are made.

  • Sponsored By EMC // Oct 2014

    Addressing key issues for managers of complex contracts in energy and engineering

    Contract and project management is a significant challenge in the energy and engineering industries. Supplier Exchange will allow participants to define workflows and collaboration methods that improve contract management by greatly reducing the time and cost to find and validate relevant information.

  • Sponsored By EMC // Oct 2014

    Using Document Control to Keep Your Projects on Track

    In the past, collecting, distributing and tracking documents has been time consuming and inefficient process. Finding the right document for a transmittal can mean digging through hundreds of emails of untold numbers of shared files. Fortunately there is an easier way.

  • Sponsored By EMC // Oct 2014

    Managing Assets for Maximum Performance and Value

    State-of-the-art asset management is critical in industries such as oil and gas exploration and production, oil refining and gas processing, and utilities that rely heavily on expensive and aging physical assets. Among other benefits, effective asset management reduces costs and risks, improves process flows and business continuity, increases profit margins,...

  • Sponsored By IBM // Oct 2014

    Virtualizing DR using Cloud : Protect your Applications Quickly With a Resilient Cloud

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

  • Sponsored By FireEye // Oct 2014

    Cybersecurity's Maginot Line

    This report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures alone. Security teams must be able to see the alerts that matter. And they must complement those with rapid endpoint response expertise to confirm and contain attacks as...