White Papers
TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.
Search the Library
White Papers by Topic
-
Gartner Magic Quadrant for Enterprise Information Archiving, 2014
Analyst firm Gartner, Inc. once again positions Proofpoint's cloud-based Enterprise Archiving product in the Leaders Quadrant of the new 2014 Magic Quadrant for Enterprise Information Archiving which provides a detailed overview of the Enterprise Information Archiving market. Gartner notes that, “Archiving as a service (aka cloud archiving) has rapidly...
-
Gartner Magic Quadrant for Secure Email Gateways, 2014
Whether you’re looking to stop advanced inbound email threats from entering your organization, or to reduce the legal, financial and evolving regulatory compliance risks associated with outbound email - you need to feel confident your choice of solution is protecting your most critical business information. Proofpoint is proud to be...
-
Analysis of Cybercrime Infrastructure
Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime...
-
The New Art of War: 2014 Targeted Attacks Study
From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the threat landscape has evolved dramatically. It's time to match advanced threats with tools and training...
-
The Human Factor Report
The Human Factor report documents the results of a wide-ranging study that provides new insight into the ways attackers exploit end-users’ psychology to circumvent IT security. The report reveals that staff clicks on malicious links twice as much as executives. More than 1 in 15 people click at least a...
-
The Business Data Ecosystem: Exploring the Five Elements of Digital Storage
Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily...
-
Understanding ERP Deployments Choices
The rapid evolution of global business has changed the way companies are approaching the deployment of ERP. Today’s need for agility and responsiveness has increased the demand for deployment choices; the constraints of early ERP systems have become increasingly pronounced in markets where change is accelerating, and the ability...
-
Meeting the Big Data Challenge: Get Close, Get Connected
Big Data can be a key tool in gaining a competitive advantage—allowing businesses to better understand and target their customers and transform their processes. This paper outlines the challenges related to Big Data and how to manage and overcome them, so you can derive value faster.
-
Creating an Interconnected Cloud Service
As more and more customers rely on cloud computing, providers need to be prepared to tackle the challenges that are inherent to widespread cloud adoption and optimize their service performance. Achieving an optimal level of performance isn’t simple. It’s a multifaceted challenge, and Cloud Service Providers (CSP) has many customer...
-
Scaling SaaS Delivery for Long-Term Success - THINKstrategies Report
Adoption of software-as-a-service (SaaS) solutions is accelerating. SaaS applications are almost always more flexible, versatile and cost-effective than traditional on-premises solutions. This trend represents a great opportunity for established SaaS companies to expand their customer base. But it also presents challenges for SaaS providers seeking to gain a competitive advantage...
-
CITO Research: How Network Connections Drive Web Application Performance
The default paradigm of an application has evolved from users sitting at desktops attached to the corporate data centre to mobile access via phones and tablets, each requiring its own optimized experience. Add to that the fact that both users and application components are literally all over the world and...
-
Next - Generation Security Platform for Manufacturing Companies
This whitepaper is analysing the challenges in Security Control Systems in Manufacturing organisations such as deploying information technology in automation environments, and the use of virtualization, mobility and SaaS applications to increase productivity. It is also exploring the advantages of Palo Alto Networks Next-Generation Security Platform to address all these...
-
Stream Line Payment Card Industry (PCi) Compliance With Next-Gen Security
Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for “… all entities involved in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive...
-
Next - Generation Security Platform for Critical Infrastructure
SCADA and Industrial Control Systems (ICS), which are used to automate industrial processes in critical infrastructure industries such as utilities and transportation, have undergone dramatic transformations. What once was a collection of isolated, proprietary systems based on serial protocols are now highly interconnected systems which leverage the internet protocol and...
-
Webinar: How Zerox Leverages User Activity Monitoring
Learn how Xerox has taken a new approach to improve information security by leveraging user activity monitoring. Join Arvo Bowen for a live webcast on January 21 at 11am EST. See how Xerox identifies user-based risks before they become a security incident.
-
Moving to Hybrid Cloud: Top 5 Considerations
Businesses are embracing public cloud because it promises increased agility and scalability. But it can also introduce complexity, interoperability, and security concerns. Hybrid cloud is emerging as a way to mitigate those concerns by providing the right combination of internal controls with the ability to securely scale to meet business...
-
Tech Tips: How to Get Started with VMware vCloud Air Disaster Recovery
Few companies can afford operational disruption, yet IT budgets remain flat and can’t encompass the growing need for additional resiliency measures to protect critical-business applications. The recovery-as-a-service offering from VMware, VMware vCloud® Air™ Disaster Recovery, helps you fulfill the need to implement or supplement your organization’s continuity plans while addressing...
-
A Guide to Hybrid Cloud
Businesses are looking for a more flexible IT framework that can adapt to today’s rapidly changing and global environment…learn more
-
Top Three Reasons to Use vCloud Air Disaster Recovery
Traditional disaster recovery solutions are expensive and complex. That’s making disaster recovery in the cloud a compelling alternative for many small-to-mid sized companies. Cloud solutions are more affordable, require less commitment, and offer more capacity—an ideal combination for resource-strapped organizations. VMware vCloud® Air™ Disaster Recovery is easy to deploy and...
-
Ten Reasons to choose vCloud Air- Infographic
More than 30% of organizations expect that within three years, they’ll access 45.5% of IT resources through some form of cloud—public, private, or hybrid.* That’s an impressive number, and there’s a reason for it: the cloud is packed with benefits. And if you’re a VMware customer, you’re already halfway there....






