White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By HP // Aug 2014

    Security Considerations When Undergoing a Network Refresh

    Corporate networks are under a constant state of siege - not just from threats but from the pressure of supporting the ever-growing number of clients, devices and platforms that have resulted from the BYOD phenomena. Network demands will only increase as we move to the internet of things adding sensors...

  • Sponsored By HP // Aug 2014

    Building a Better Network Security Strategy

    In today's global, always-on world, network security is crucial. Enterprises need to ensure that employees accessing their networks are secure at all times. A comprehensive network security solution needs to include a number of factors, including • Network reliability • Resources for managing the network • Network features and...

  • Sponsored By HP // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

  • Sponsored By CommVault Systems // Aug 2014

    5 Strategies for Modern Data Protection

    It’s no secret that today’s unprecedented data growth, datacenter consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you’re poised to meet...

  • Sponsored By CommVault Systems // Aug 2014

    Gartner 2014 Enterprise Backup Software and Integrated Appliances Magic Quadrant

    According to Gartner, the backup/recovery software and integrated appliance market comprises tens, if not hundreds, of vendors. This research narrows it down to those that have a strong presence in midsize and large organization IT environments.” Download the report to learn why CommVault has been named a leader and why...

  • Sponsored By Kaseya // Aug 2014

    Managing the Complexity of Today's Hybrid IT Environments

    There are many factors driving the complexity of IT today, each making it harder for organizations to get their hands around IT. As a result IT managers, need new ways to effectively manage and secure their environment and ensure IT service and business success. Read this whitepaper to...

  • No topic

    Sponsored By Global Knowledge // Aug 2014

    ITIL® 2015 and Beyond: Six Trends Driving the Increased Importance of the Service Desk

    IT service managers are now required to rethink the way they deliver and support services. This white paper provides a snapshot of challenges for IT service and support and explains why the Service Desk is now more critical than ever.

  • No topic

    Sponsored By Global Knowledge // Aug 2014

    Introduction to Troubleshooting Cisco Networks

    This white paper explains how you can obtain the skills for troubleshooting Cisco networks, which requires mastery of several basic steps and much practice before applying the skills effectively in a production environment. This document does not contain any troubleshooting cases or examples because that is not how troubleshooting skills...

  • No topic

    Sponsored By Global Knowledge // Aug 2014

    Virtualization and Cloud Computing: Does One Require the Other?

    Many people believe that cloud computing requires server (or desktop) virtualization. But does it? We will look at using virtualization without cloud computing, cloud computing without virtualization, and then look at using both together. In each case, we'll look at where each deployment might be most useful, some use cases...

  • No topic

    Sponsored By Global Knowledge // Aug 2014

    VMware Horizon 6 Overview

    VMware Horizon 6 was announced in April and began shipping in June 2014, bringing a more unified suite delivering more integration with infrastructure and cloud products and more simplicity for all devices. Along with the numerous updates across the Horizon suite, VMware has transitioned to a more traditional product licensing...

  • Sponsored By IBM // Aug 2014

    IBM X-Force Threat Intelligence Quarterly - 2Q 2014

    This quarterly report from the IBM X-Force research and development team looks at how application vulnerabilities, spam threats and incident response are evolving - based on the latest data and ongoing analysis. It also includes insights from the IBM Global Technology Services division.

  • Sponsored By IBM // Aug 2014

    EMA Report: Data Capture and Network Forensics, State-of-the-Market: IBM Security QRadar Incident Forensics vs. Other Industry Tools

    In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92.

  • Sponsored By IBM // Aug 2014

    IBM Threat Protection System

    IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

  • Sponsored By IBM // Aug 2014

    2014 Gartner Critical Capabilities for SIEM

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

  • Sponsored By IBM // Aug 2014

    2014 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers' greatest...

  • Sponsored By Box // Aug 2014

    Three Reasons to Choose Box, Now

    The benefits of eliminating on-premise file share for cloud-based collaboration are clear and quantifiable. This white paper demonstrates why businesses choose Box to unify their storage and collaboration and avoid the upfront and ongoing costs of storage, data center infrastructure and LAN optimization. With independent analysis supported by ESG, the...

  • Sponsored By Box // Aug 2014

    InfoTech Cloud File Sharing Market Report

    Organizations are increasingly turning to cloud file sharing solutions to meet end-user's needs for a lightweight and effective collaboration tool. In this report, Info-Tech highlights their evaluation of eight leading vendors in this market, including Google, Dropbox, Microsoft, Box and others. See how each scored and find out who emerged...

  • Sponsored By Dell Software // Aug 2014

    Securing the Small Business Network

    This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

  • Sponsored By Dell Software // Aug 2014

    A New Set of Network Security Challenges

    This new IDG survey reveals optimism about the ability of next-generation firewalls to help IT balance productivity and security. With both productivity and security becoming increasingly crucial, IT faces conflicting mandates from the business.

  • Sponsored By Dell Software // Aug 2014

    Achieve Deeper Network Security and Application Control

    Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we know it. Traditional firewalls that only focus on stateful packet inspection and access control rules are not effective in today’s advanced-threat environment.