White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By CA Technologies // Sep 2014

    What you really want from Infrastructure Management

    This whitepaper explores the benefits of a complete and unified visualisation system that can monitor everything in IT operations environment, monitoring the performance, and availability of any aspect that support business services.

  • Sponsored By CA Technologies // Sep 2014

    Why Most Organisations Miss User Response Monitoring – and What to Do About It

    This guide looks at the challenges of user response monitoring, and it shows how you can overcome these challenges and start to get a real handle on your infrastructure performance and how it impacts your user’s experience.

  • Sponsored By Webroot Software // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    BYOD security management adds complications that businesses have not faced before – the devices are owned by employees and contain the owners’ personal data. To explore the disconnect between the employees and employer’s BYOD attitude, Webroot commissioned a two part research survey to help bridge the security gap between employees’...

  • Sponsored By Webroot Software // Sep 2014

    Performance Benchmark Report 2014

    PassMark Software® conducted objective performance testing on 8 security software products using 13 performance metrics. Find out how Webroot’s SecureAnywhere Business Endpoint Protection product performs against 7 competitor products. Download this research to learn more.

  • Sponsored By Sophos // Sep 2014

    Firewall Buyers Guide

    Five key areas to consider when choosing your next firewall Checklist of the security capabilities you need Questions to ask vendors to make sure they meet your requirements Comparisons of Sophos, Fortinet, Dell SonicWALL and WatchGuard

  • Sponsored By Sophos // Sep 2014

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably — so it’s easy to get confused about which type of protection is right for you. This Manager’s Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

  • Sponsored By Sophos // Sep 2014

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority—security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

  • Sponsored By CA Technologies // Sep 2014

    Unified IT Monitoring: A Necessity in the Era of Customer

    This exclusive whitepaper details how unified IT monitoring can be used to deliver the customer experience your users demand. Read this report now to learn about a real life company that adopted unified IT monitoring and turned itself into an IT leader.

  • Sponsored By Webroot Software // Sep 2014

    ThreatBrief - CryptoLocker Your Money or Your Life

    Since September 2013, a new and vicious form of malware Cryptolocker has been wreaking havoc, which belongs to a family of malware called ransomware. Find out how Webroot SecureAnywhere solutions uses cloud-predictive behavioural intelligence to discover malware. Download this report to learn more about Cryprolocker and what measures your organizations...

  • Sponsored By Palo Alto Networks // Sep 2014

    Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on...

  • Sponsored By IBM // Sep 2014

    Following the Rules - Reducing the Risk

    A short article by AIIM on compliance

  • Sponsored By IBM // Sep 2014

    Buyer Brief- Improving the Management and Governance of Unstructured Data

    Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition

  • Sponsored By IBM // Sep 2014

    Information Lifecycle Governance Leader - Reference Guide

    Data is growing at unprecedented rates. But how much of it is useful to your business? Read this leader guide from the Compliance, Governance and Oversight Council (CGOC) to learn how to deal with excessive data, get more value from information assets, control costs, ensure compliance, and reduce risk.

  • Sponsored By IBM // Sep 2014

    Information Lifecycle Governance - Requirements Kit

    Data volumes are getting out of control, but choosing the right information lifecycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you need.

  • Sponsored By Epicor // Sep 2014

    Modern ERP is Essential to Better Customer Experience – Infographic

    Perceptions of customer experience and service offered differ from customers to sellers. While sellers’ rate experience offered at more than 4 out 5, purchasers’ rate experience offered at 3 out of 5. Why the disconnection? Service represents 90% of the perceived sales value. So, How can we improve customer experience...

  • Sponsored By Epicor // Sep 2014

    The rise of Mobile Access to your ERP Data

    Mobile user access to ERP and other back office systems has become a core requirement as organizations seek operational efficiency and deepening customer engagement. Without mobile access, system users are disadvantaged by needing to return to a desktop, often after a job is completed, to enter data relating to that...

  • Sponsored By Epicor // Sep 2014

    Why Adaptive ERP Is Important? – Epicor 10

    Response to the changed competitive landscape demands that ERP not only support the executive agenda but also the needs of individuals, regardless of where they are in an organization’s value network. Only then companies can mobilize quickly and respond effectively to events as they occur at breakneck speed, whether in...

  • Sponsored By Symantec // Sep 2014

    Symantec Cybercrime Survival Guide.

    Almost 400 million people fall victim to cybercrime every year. This essential survival guide will help you navigate the wilds and come out of the other side safe, sound and protected. Learn more...

  • Sponsored By Symantec // Sep 2014

    Website visitor acquisition and Conversion Solutions.

    This ecommerce guide offers businesses who feel that their web marketing return has levelled out, some hints on how to improve visitor acquisition and conversion rates. Read more...

  • IBM

    Sponsored By IBM // Sep 2014

    Improve Collaboration By Adding Social Capabilities to Email

    The IDC Technology Spotlight Whitepaper examines how Email is the key mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. However, as relationships across all business communication channels continue...