White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Webroot Software // Apr 2014

    Webroot® Mobile Threat Report

    Webroot believes that users and system administrations should be armed with the most up-to-date information on the risks and security issues currently facing the deployment and use of mobile devices. As employees continue to employ their own devices for work purposes, greater threats are introduced into the workplace leaving company...

  • Sponsored By Webroot Software // Apr 2014

    Webroot® Threat Brief

    New viruses, and updated versions of existing viruses, are released daily, even hourly. Because of this, signature-based threat detection cannot be effective. Instead, Internet security solutions such as Webroot's SecureAnywhere solutions that use behavioural detection are necessary. Read this Whitepaper to find out why.

  • Sponsored By Webroot Software // Apr 2014

    PassMark Software®: Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the...

  • Sponsored By LogMeIn // Apr 2014

    Harvard Business Review: The Truth About Customer Experience

    Companies have long emphasized touchpoints - the many critical moments when customers interact with the organization and it's offerings on their way to purchase and after. But the narrow focus on maximizing satisfaction at those moments can create a distorted picture, suggesting that customers are happier with the company than...

  • Sponsored By Ring Central // Apr 2014

    What Every Business Needs to Know When Selecting a Phone System

    Whether you are starting a new business or expanding your existing business, you will need to choose a business phone system that meets your organisation’s requirements. This Buyer's guide provides you with essential information and tools so you can understand your options, and make the decision that meets the needs...

  • Sponsored By Acronis // Apr 2014

    U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

  • Sponsored By Imperva // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    With network security solutions failing to stop modern threats such as web attacks, business logic threats and online fraud, web application firewalls (WAFs) have become the central platform for protecting applications. WAFs are designed to secure applications against the ongoing barrage of cybercriminals, hacktivists and state-sponsored hackers. However, not all...

  • Sponsored By Imperva // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

  • Sponsored By Imperva // Apr 2014

    Mitigate the OWASP Top 10 Web Application Security Risks

    The OWASP Top 10 is widely recognized as one of the leading standards for identifying critical Web application security risks. This technical brief analyzes the risks in the OWASP Top 10 and outlines how you can protect your organization against each threat. Risks discussed in this paper include: cross-site scripting,...

  • Sponsored By Imperva // Apr 2014

    Web Attack Survival Guide

    With an increasing amount of business being conducted online, the Internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial espionage, sabotage and cyber terrorism are becoming more frequent, resulting in lost revenue, stolen data, service interruptions and damaged reputations. This guide will...

  • Sponsored By Imperva // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web applications are inherently insecure. Most businesses rely on network security solutions like intrusion prevention systems (IPS) and next-generation firewalls (NGFWs) to keep hackers at bay. These solutions, however, do not provide the accuracy, the granularity or the breadth of protection required to stop all web-based attacks. This white paper...

  • Sponsored By IBM // Apr 2014

    Protect the Mobile Enterprise with Smarter Security

    Mobile security, and ensuring users do the right thing, is one of the highest priorities of today’s CIOs. Although mobile employees can be more productive by working anytime and anywhere, they are now accessing corporate data and applications from outside the traditional network perimeter. This means traditional access and authentication...

  • Sponsored By IBM // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

  • Sponsored By IBM // Apr 2014

    IBM: Consolidated Security Management for Mainframe Clouds

    Organisations today grapple with the expansion of distributed computing, increased online collaboration, explosive data growth and heterogeneous IT environments—all issues that make information security more critical, yet more complex than ever. In this white paper, IBM takes a look at organisations who allow the mainframe to serve as an enterprise...

  • Sponsored By F5 // Apr 2014

    Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

  • Sponsored By F5 // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

  • Sponsored By F5 // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

  • Sponsored By F5 // Apr 2014

    How to Fill the Threat Management Gateway Void

    The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it’s important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and...

  • Sponsored By VMware // Apr 2014

    Top 3 Reasons for IT to Adopt Desktop Virtualization

    Driven by trends such as Bring Your Own Device (BYOD) and the consumerization of IT, organizations are increasingly adopting desktop virtualization. Even though these companies are driving down costs and improving operational efficiencies, some IT departments remain cautious and even downright skeptical about desktop virtualization. But with new hardware advancements—such...

  • Sponsored By VMware // Apr 2014

    7 key indicators that you need to extend virtualization to the desktop.

    Read this whitepaper on When It Makes Sense to Move to Desktop Virtualization to learn more about the 7 key indications that your business is ready for VDI. Find out how deploying VMware Horizon View can improve your IT infrastructure by: Giving IT easy control over data access...