White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study- Australia

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in Australia.

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study-India

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in India.

  • Sponsored By IBM // Oct 2014

    Gartner Magic Quadrant: Global Managed Security Services

    Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. This Gartner Magic Quadrant report positions IBM among the leaders in managed security services providers, based on "ability to execute"...

  • Sponsored By IBM // Oct 2014

    2014 Ponemon Cost of Data Breach Study Sponsored by IBM - Global Analysis

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations.It answers critical questions such as: How much can a data breach cost? And are you doing enough to prevent it from happening to you?

  • Sponsored By McAfee // Oct 2014

    TIE Webinar – Turning the Tables on Cyber-Attacks - 6 November 2014

    Thursday 6th November 2014 Every day organisations – just like yours – fall victim to data theft through advanced targeted attacks. The costs of data breaches and remediation are extremely high, particularly when it comes to your company/client records and the devastating loss in consumer confidence. What if you could...

  • Sponsored By EMC // Oct 2014

    Operationalizing Excellence in Global Regulatory Process

    As life sciences companies face expiring patents and shrinking drug-development pipelines, it’s never been more important to streamline the regulatory submissions process and get products to market faster. But to date, most systems for authoring, managing and submitting regulatory documents have had serious limitations in key areas for regulatory submissions...

  • Sponsored By EMC // Oct 2014

    A 15-minute guide for life sciences and manufacturing organisations

    By unifying, simplifying and automating the management of controlled documents, your organisation can create efficient, flexible and most importantly compliant manufacturing operation that increases product quality and productivity and prevents remediation, consent decrees and product recalls.

  • Sponsored By EMC // Oct 2014

    Obtain a 360-degree view of regulatory activity

    Are you having a hard time finding and keeping track of your organisation’s growing volume of electronic submissions and regulatory correspondence? You’re not alone. Efficient access to archived submissions, along with their associated correspondence, has become a challenge that almost every life sciences firm grapples with.

  • Sponsored By HP // Oct 2014

    Lower Risk and Cost with Proactive Information Governance

    Read this white paper to find out how you can help ensure your data assets are available, protected, and managed through their lifecycle by applying proactive information governance for: Organization Location And control

  • Sponsored By EMC // Oct 2014

    Using Information Intelligence to Improve Projects in the Energy Sector

    In the energy industry, successful execution of projects in the design, construction, and operation of plants and facilities is dependent on more than ensuring that schedules and budgets are met. Management of the asset life cycle from planning all the way through to decommissioning requires systems and tools that support...

  • Sponsored By EMC // Oct 2014

    Learn the four stages to operational excellence

    The key to effective management is having the right information at your disposal. It does little good to have an “as-designed” document in your hands when there’s a more accurate “as-built” document that you can’t locate. When information is missing mistakes are made.

  • Sponsored By EMC // Oct 2014

    Addressing key issues for managers of complex contracts in energy and engineering

    Contract and project management is a significant challenge in the energy and engineering industries. Supplier Exchange will allow participants to define workflows and collaboration methods that improve contract management by greatly reducing the time and cost to find and validate relevant information.

  • Sponsored By McAfee // Oct 2014

    Narrowing the gap from encounter to containment with TIE

    McAfee® Threat Intelligence Exchange (TIE) enables adaptive threat prevention by sharing relevant security data across endpoints, gateways, and other security products. Sharing of data allows these products to operate as one, exchanging and acting on collective threat intelligence, and as a result, narrowing the gap from encounter to containment from...

  • Sponsored By McAfee // Oct 2014

    The inefficiency of unintegrated security operations

    Unintegrated security operations remain reactive and complex, unautomated, and unoptimized. This inefficiency creates a high ongoing operational cost for security while leaving your data and networks exposed to determined attackers who will then have ample space and white noise in which to enter, hide, and persist within your organization. There...

  • Sponsored By EMC // Oct 2014

    Using Document Control to Keep Your Projects on Track

    In the past, collecting, distributing and tracking documents has been time consuming and inefficient process. Finding the right document for a transmittal can mean digging through hundreds of emails of untold numbers of shared files. Fortunately there is an easier way.

  • Sponsored By EMC // Oct 2014

    Managing Assets for Maximum Performance and Value

    State-of-the-art asset management is critical in industries such as oil and gas exploration and production, oil refining and gas processing, and utilities that rely heavily on expensive and aging physical assets. Among other benefits, effective asset management reduces costs and risks, improves process flows and business continuity, increases profit margins,...

  • Sponsored By IBM // Oct 2014

    Virtualizing DR using Cloud : Protect your Applications Quickly With a Resilient Cloud

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

  • Sponsored By FireEye // Oct 2014

    Cybersecurity's Maginot Line

    This report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures alone. Security teams must be able to see the alerts that matter. And they must complement those with rapid endpoint response expertise to confirm and contain attacks as...

  • Sponsored By FireEye // Oct 2014

    Mandiant 2014 Threat Report

    Cyber threat actors are expanding the uses of computer network exploitation to fulfil an array of objectives, from the economic to the political. Private organizations have increasingly become collateral damage in political conflicts. With no diplomatic solution in sight, the ability to detect and respond to attacks has never been...

  • Sponsored By FireEye // Oct 2014

    FireEye Advanced Threat Report

    The data contained in this report comes from the FireEye® Dynamic Threat Intelligence™ (DTI) cloud, which provides attack metrics shared by FireEye customers across the globe. It offers strong evidence that malware infections occur within enterprises at an alarming rate. It also shows that advanced attackers can penetrate legacy defences...