White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • No topic

    Sponsored By Imperva // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    With network security solutions failing to stop modern threats such as web attacks, business logic threats and online fraud, web application firewalls (WAFs) have become the central platform for protecting applications. WAFs are designed to secure applications against the ongoing barrage of cybercriminals, hacktivists and state-sponsored hackers. However, not all...

  • No topic

    Sponsored By Imperva // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

  • No topic

    Sponsored By Imperva // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

  • No topic

    Sponsored By Imperva // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the Internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This guide will...

  • No topic

    Sponsored By Imperva // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web applications are inherently insecure. Most businesses rely on network security solutions like intrusion prevention systems (IPS) and next-generation firewalls (NGFWs) to keep hackers at bay. These solutions, however, do not provide the accuracy, the granularity or the breadth of protection required to stop all web-based attacks. This white paper...

  • Sponsored By IBM // Apr 2014

    Protect the Mobile Enterprise with Smarter Security

    Mobile security, and ensuring users do the right thing, is one of the highest priorities of today’s CIOs. Although mobile employees can be more productive by working anytime and anywhere, they are now accessing corporate data and applications from outside the traditional network perimeter. This means traditional access and authentication...

  • Sponsored By IBM // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

  • Sponsored By IBM // Apr 2014

    IBM: Consolidated Security Management for Mainframe Clouds

    Organisations today grapple with the expansion of distributed computing, increased online collaboration, explosive data growth and heterogeneous IT environments—all issues that make information security more critical, yet more complex than ever. In this white paper, IBM takes a look at organisations who allow the mainframe to serve as an enterprise...

  • Sponsored By F5 // Apr 2014

    Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

  • Sponsored By F5 // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

  • Sponsored By F5 // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

  • Sponsored By F5 // Apr 2014

    How to Fill the Threat Management Gateway Void

    The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it’s important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and...

  • Sponsored By VMware // Apr 2014

    Top 3 Reasons for IT to Adopt Desktop Virtualization

    Driven by trends such as Bring Your Own Device (BYOD) and the consumerization of IT, organizations are increasingly adopting desktop virtualization. Even though these companies are driving down costs and improving operational efficiencies, some IT departments remain cautious and even downright skeptical about desktop virtualization. But with new hardware advancements—such...

  • Sponsored By VMware // Apr 2014

    7 key indicators that you need to extend virtualization to the desktop.

    Read this whitepaper on When It Makes Sense to Move to Desktop Virtualization to learn more about the 7 key indications that your business is ready for VDI. Find out how deploying VMware Horizon View can improve your IT infrastructure by: Giving IT easy control over data access...

  • Sponsored By VMware // Apr 2014

    Whiteboard: Delivering Desktops and Applications as a Service

    VMware® Horizon View™ makes it easy to deliver desktops and applications as a service to your end users on top of your existing vSphere™ platform. Watch this whiteboard video from VMware reference architect, Tristan Todd, for a brief lesson on how to successfully deploy View for a flexible and secure...

  • Sponsored By VMware // Apr 2014

    Tech Tips: Storage for VMware Horizon View Virtual Desktop Infrastructure Video

    The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So...

  • Sponsored By LogMeIn BoldChat // Apr 2014

    Mobile Customer Care: It’s More than Hype

    The customer / company relationships stand in the midst of the mobile revolution. The growing consumer adoption and use of mobile devices means that customers are increasingly incorporating mobile as part of their interactions with businesses. However, are businesses ready for this change in customer behavior? This report will illustrate...

  • Sponsored By LogMeIn BoldChat // Apr 2014

    Effective Mobile Engagement

    This report, based on the survey results with nearly six thousand respondents across ten countries, sheds light on mobile engagement, including its current state, channels in use, which industries consumers are engaging with, and how well they are doing. Additionally, it evaluates engagements for technical support vs. shopping, expectations...

  • Sponsored By Gigya Inc. // Apr 2014

    Navigating the New Identity Ecosystem: 3 Hurdles Facing Modern IT Professionals

    Consumer identity data is becoming increasingly unmanageable with the growth of big data and mobile, social and digital channels. Modern businesses need a better way to solve today’s identity and access management (IAM) problems that removes service maintenance and reliability burdens from IT’s shoulders. Take an in-depth look at 3...

  • Sponsored By Acquia // Apr 2014

    Liberate Your Commerce Platform without Selling the Family Farm

    This ebook offers a possible solution to businesses that already have made big investments in enterprise commerce platforms, but that also struggle to keep up with the quickly changing landscape of shopping experiences and business models. Drupal’s flexibility, scalability, and rapid deployment capability make it possible to build shiny...