White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Hewlett-Packard (HP) // May 2015

    HP ArcSight Logger Data Sheet

    Collect logs and machine data from any device, vendor and source with broadest set of data collection comprehensively at high speeds. To learn more, read the data sheet.

  • Sponsored By Hewlett-Packard (HP) // May 2015

    HP Logger Trial at no charge

    With HP Logger you can improve everything from IT operations, compliance and risk management to security intelligence. This universal log management solution collects machine data from any log-generating source and unifies the data for searching, indexing, reporting, analysis, and retention. HP Logger can be used by organizations of any size...

  • Sponsored By Hewlett-Packard (HP) // May 2015

    How to install HP Logger in 2 hours to provide immediate reports

    HP Logger collects information from any system that generates log data. It can process that information as much or as little as desired, and can produce ultra-fast searching across the data.

  • Sponsored By Hewlett-Packard (HP) // May 2015

    HP Logger Log Management Industry Use Cases

    Using HP Logger to perform forensics on your event log data and syslog data greatly reduces the time it takes to identify an intruder and take action.

  • Sponsored By Intel & Red Hat // May 2015

    Transforming the Cloud Data Centre

    This report will explore how organisations today are driving greater performance and lower the TCO of enterprise and cloud data centres. With more than a decade working together, Red Hat software and Intel architecture share their insights on getting the most out of your organisation's cloud Infrastructure.

  • Sponsored By Intel & Red Hat // May 2015

    Step-by-Step Configuration Guide

    Security is a major concern for IT professionals when think about the implementation of cloud computing solutions. In overcoming those concerns and enabling the hosting of all workloads, including those that depend on sensitive information, robust security mechanisms play a vital role. Intel and Red Hat come together to provide...

  • Sponsored By Intel Security // May 2015

    Seven Reasons Why McAfee Enterprise Security Is Your Best Choice for Microsoft Windows 8

    McAfee® Enterprise Security—now a part of Intel® Security—is your best choice for Microsoft Windows 8, as Windows 8 offers an extensive array of features as well as improved performance and security. Let’s explore the seven reasons why McAfee is your best choice to secure Windows 8.

  • Sponsored By Intel Security // May 2015

    Protecting Against Mobile App SSL Vulnerabilities

    In these days of “there’s an app for that” and the excitement that goes along with new, groundbreaking mobile app ideas, users rarely think about the ways in which mobile apps may be exposing sensitive information to man-in-the-middle (MITM) attacks—and, as a result, breaking the trust held in these supposedly...

  • Sponsored By Dell Software // May 2015

    Ten Sneaky Things a Spammer Will Do

    Spam will continue to plague Inboxes until it is no longer profitable for the spammer or there is a hack-proof method of prevention that is easy to use. Read this ebook and learn the techniques spammers employ to reach their target audience, and discover the solutions that can help protect...

  • Sponsored By Dell Software // May 2015

    Phishing: When Email is the Enemy

    Assuming your employees or spam filter can detect the difference between legitimate emails and phishing scams is not enough. Discover the challenges of staying ahead of phishing and learn a framework to incorporate anti-phishing actions into your existing security processes.

  • Sponsored By Dell Software // May 2015

    Best Practices Checklist: Email Security Cloud and Virtual Migration

    Looking for best practices to ensure a secure email for cloud and virtual migration? If you are considering migrating email security to the cloud, read this paper and discover best practices for planning and executing an email security migration that minimizes the risk of business disruption.

  • Sponsored By IBM // May 2015

    The Data Center Impact of Cloud, Analytics, Security, Social and Mobile

    An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.

  • Sponsored By Macquarie Telecom Australia // May 2015

    Disaster Avoidance vs Disaster Recovery

    Disaster Avoidance (DA) and Disaster Recovery (DR) are both critical elements of a general disaster-coping strategy.This paper explores the difference between the two and what each can do to prepare companies for disaster. This report explores such topics as: Why is disaster preparedness important? Stopping disasters before they start Which...

  • Sponsored By Macquarie Telecom Australia // May 2015

    How to develop a Business Continuity Plan

    A disaster or interruption can occur at any time without any warning—your company’s survival depends on the steps you take to prepare for these potentially catastrophic events. The most effective preparation takes the form of a written document called a Business Continuity Plan (BCP). This document serves as a guide...

  • Sponsored By Cisco Systems // May 2015

    Achieve More with Video Collaboration - Cisco CMR

    As the workforce becomes more mobile and distributed, leaders recognise that video is an essential component of effective business collaboration. Video conferencing is becoming more pervasive, as it delivers a range of proven benefits to teams and orqanisations. Cisco Collaboration Meeting Rooms (CMR) ...

  • Sponsored By Webroot // May 2015

    Webroot 2015 Threat Brief

    Did you know that: • 85,000 malicious IPs are launched every day? • Less than 55% of all URLs are Trustworthy? • 30% of Internet Users access Phishing sites? • 15% of New files are malicious executables? • Only 28% of mobile apps are trustworthy? The Webroot 2015 Threat Brief,...

  • Sponsored By Webroot // May 2015

    The Importance of Cyber Threat Intelligence to a Strong Security Posture

    Recently, the Ponemon Institute surveyed 693 IT security professionals from Fortune 1000, Global 2000 and the Forbes List of Largest Private Companies in order to understand how organizations are using, gathering and analyzing threat intelligence as part of their broader cybersecurity strategy. The resulting report answers the following questions: •...

  • Sponsored By Webroot // May 2015

    The 12 Leading Players in the Corporate Web Security - Market Quadrant

    Webroot has again been identified as a “Trail Blazer” in the Corporate Web Security Market Quadrant 2014 report by The Radicati Group. The independent analysis recognizes Webroot SecureAnywhere® Web Security Service for its cloud-based threat detection, predictive threat intelligence and robust content filtering. The report includes in-depth, expert analysis of...

  • Sponsored By Blue Coat Systems, Inc. // Apr 2015

    ESG Report: Network Encryption and its Impact on Enterprise Security

    Taken from a collaborative research survey of 150 IT and information security professionals, this report will evaluate the information security practices used to decrypt and inspect encrypted traffic and new technologies being adopted to protect organisation. Based upon the data collected, this paper concludes: Network encryption is ubiquitous and...

  • Sponsored By Blue Coat Systems, Inc. // Apr 2015

    ETM Comparison Matrix

    This Matrix will provide a comparison between the Encryption Traffic Management Solutions available to organisations today. The Report will examine why Blues Coat and their ETM is leading the way in providing organisations with the tools to combat hidden risks in your SSL and HTTPS traffic, enforce your policies, and...