White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Proofpoint // Dec 2014

    Gartner Magic Quadrant for Enterprise Information Archiving, 2014

    Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market. Gartner notes that, “Archiving as a service (aka cloud archiving) has rapidly...

  • Sponsored By Proofpoint // Dec 2014

    Gartner Magic Quadrant for Secure Email Gateways, 2014

    Whether you’re looking to stop advanced inbound email threats from entering your organization, or to reduce the legal, financial and evolving regulatory compliance risks associated with outbound email - you need to feel confident your choice of solution is protecting your most critical business information. Proofpoint is proud to be...

  • Sponsored By Proofpoint // Dec 2014

    Analysis of Cybercrime Infrastructure

    Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime...

  • Sponsored By Proofpoint // Dec 2014

    The New Art of War: 2014 Targeted Attacks Study

    From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...

  • Sponsored By Proofpoint // Dec 2014

    The Human Factor Report

    The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...

  • Sponsored By Seagate // Dec 2014

    The Business Data Ecosystem: Exploring the Five Elements of Digital Storage

    Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily...

  • Sponsored By Epicor // Dec 2014

    Understanding ERP Deployments Choices

    The rapid evolution of global business has changed the way companies are approaching the deployment of ERP. Today’s need for agility and responsiveness has increased the demand for deployment choices; the constraints of early ERP systems have become increasingly pronounced in markets where change is accelerating, and the ability...

  • Sponsored By Equinix // Dec 2014

    Meeting the Big Data Challenge: Get Close, Get Connected

    Big Data can be a key tool in gaining a competitive advantage—allowing businesses to better understand and target their customers and transform their processes. This paper outlines the challenges related to Big Data and how to manage and overcome them, so you can derive value faster.

  • Sponsored By Equinix // Dec 2014

    Creating an Interconnected Cloud Service

    As more and more customers rely on cloud computing, providers need to be prepared to tackle the challenges that are inherent to widespread cloud adoption and optimize their service performance. Achieving an optimal level of performance isn’t simple. It’s a multifaceted challenge, and Cloud Service Providers (CSP) has many customer...

  • Sponsored By Equinix // Dec 2014

    Scaling SaaS Delivery for Long-Term Success - THINKstrategies Report

    Adoption of software-as-a-service (SaaS) solutions is accelerating. SaaS applications are almost always more flexible, versatile and cost-effective than traditional on-premises solutions. This trend represents a great opportunity for established SaaS companies to expand their customer base. But it also presents challenges for SaaS providers seeking to gain a competitive advantage...

  • Sponsored By Equinix // Dec 2014

    CITO Research: How Network Connections Drive Web Application Performance

    The default paradigm of an application has evolved from users sitting at desktops attached to the corporate data centre to mobile access via phones and tablets, each requiring its own optimized experience. Add to that the fact that both users and application components are literally all over the world and...

  • Sponsored By Palo Alto Networks // Dec 2014

    Next - Generation Security Platform for Manufacturing Companies

    This whitepaper is analysing the challenges in Security Control Systems in Manufacturing organisations such as deploying information technology in automation environments, and the use of virtualization, mobility and SaaS applications to increase productivity. It is also exploring the advantages of Palo Alto Networks Next-Generation Security Platform to address all these...

  • Sponsored By Palo Alto Networks // Dec 2014

    Stream Line Payment Card Industry (PCi) Compliance With Next-Gen Security

    Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for “… all entities involved in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive...

  • Sponsored By Palo Alto Networks // Dec 2014

    Next - Generation Security Platform for Critical Infrastructure

    SCADA and Industrial Control Systems (ICS), which are used to automate industrial processes in critical infrastructure industries such as utilities and transportation, have undergone dramatic transformations. What once was a collection of isolated, proprietary systems based on serial protocols are now highly interconnected systems which leverage the internet protocol and...

  • Sponsored By ObserveIT // Dec 2014

    Webinar: How Zerox Leverages User Activity Monitoring

    Learn how Xerox has taken a new approach to improve information security by leveraging user activity monitoring. Join Arvo Bowen for a live webcast on January 21 at 11am EST. See how Xerox identifies user-based risks before they become a security incident.

  • Sponsored By VMware // Dec 2014

    Moving to Hybrid Cloud: Top 5 Considerations

    Businesses are embracing public cloud because it promises increased agility and scalability. But it can also introduce complexity, interoperability, and security concerns. Hybrid cloud is emerging as a way to mitigate those concerns by providing the right combination of internal controls with the ability to securely scale to meet business...

  • Sponsored By VMware // Dec 2014

    Tech Tips: How to Get Started with VMware vCloud Air Disaster Recovery

    Few companies can afford operational disruption, yet IT budgets remain flat and can’t encompass the growing need for additional resiliency measures to protect critical-business applications. The recovery-as-a-service offering from VMware, VMware vCloud® Air™ Disaster Recovery, helps you fulfill the need to implement or supplement your organization’s continuity plans while addressing...

  • Sponsored By VMware // Dec 2014

    A Guide to Hybrid Cloud

    Businesses are looking for a more flexible IT framework that can adapt to today’s rapidly changing and global environment…learn more

  • Sponsored By VMware // Dec 2014

    Top Three Reasons to Use vCloud Air Disaster Recovery

    Traditional disaster recovery solutions are expensive and complex. That’s making disaster recovery in the cloud a compelling alternative for many small-to-mid sized companies. Cloud solutions are more affordable, require less commitment, and offer more capacity—an ideal combination for resource-strapped organizations. VMware vCloud® Air™ Disaster Recovery is easy to deploy and...

  • Sponsored By VMware // Dec 2014

    Ten Reasons to choose vCloud Air- Infographic

    More than 30% of organizations expect that within three years, they’ll access 45.5% of IT resources through some form of cloud—public, private, or hybrid.* That’s an impressive number, and there’s a reason for it: the cloud is packed with benefits. And if you’re a VMware customer, you’re already halfway there....