White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Citrix Systems // Jul 2015

    Best Practices to make BYOD simple and secure

    Bring-your-own-device (BYOD) programmes and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerisation in a simple, secure and...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (French)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (German)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - The New Reality of Mac in Business (French)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Apple Native Security

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - The New Reality of Mac in Business (German)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Apple Native Security (German)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

  • Sponsored By JAMF Software // Jul 2015

    JAMF Software - Apple Native Security (French)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

  • Sponsored By Symantec // Jul 2015

    The Evolution of Data Privacy (Spanish)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both.

  • Sponsored By Symantec // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Dutch)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

  • Sponsored By Symantec // Jul 2015

    The Evolution of Data Privacy (Dutch)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both. Read More..

  • Sponsored By Symantec // Jul 2015

    Symantec: Internet Security Threat Report 2015 (German)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

  • Sponsored By Symantec // Jul 2015

    The Evolution of Data Privacy (Italian)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both. Read More..

  • Sponsored By Symantec // Jul 2015

    Symantec: Internet Security Threat Report 2015 (French)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

  • Sponsored By Symantec // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Italian)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

  • Sponsored By Symantec // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Spanish)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

  • Sponsored By Symantec // Jul 2015

    Always On SSL - Symantec Guide (Portuguese)

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

  • Sponsored By Symantec // Jul 2015

    Web Security Threat Report (Portuguese)

    Symantec has the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Read More