White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Palo Alto Networks // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

  • Sponsored By CA Technologies // Oct 2014

    DevOps: The Bridge to Faster Application Delivery

    Accelerating the delivery of new applications and services to market is the core focus of DevOps, which is why 46% of IT leaders surveyed have already adopted the philosophy or are in the process of doing so. Our recent CA/IDG research survey highlights more DevOps trends that are changing the...

  • Sponsored By CA Technologies // Oct 2014

    A Pragmatic Guide to Getting Started with DevOps

    Dev and Ops should always be part of an integrated process, but that’s not always as easy as it sounds. Read this eBook to learn about common pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.

  • Sponsored By CA Technologies // Oct 2014

    The Five Essential Truths of the Application Economy

    We’re in the midst of a business revolution. Customers expect to interact with your products, services and company through software. Learn the five things IT professionals should know about the Application Economy and how it will affect their business, their industry and their careers.

  • Sponsored By CA Technologies // Oct 2014

    Truth revealed : The real DevOps story

    Smart businesses are seeing real business value out of their use of DevOps—better software quality, faster time to market, and increased revenue. What do they know that you don’t know? To discover the secrets behind the use of DevOps, research firm Vanson Bourne surveyed 1,300 senior IT decision-makers at enterprise...

  • Sponsored By CA Technologies // Oct 2014

    It’s all about the App: Mobile Security that helps enable the business

    Mobile applications are hot, but the development and externalisation of services to the mobile platform comes with risk. For many, concerns over security, privacy and platform variation stand in the way of mobile app initiatives. Learn how your organisation can leverage mobile securely and efficiently.

  • Sponsored By CA Technologies // Oct 2014

    The New Security

    It’s as much about ensuring consumer confidence as it is about defense and protection—CA security software helps you do both with accelerated app delivery and improved customer engagement with strong and proven enterprise security.

  • Sponsored By CA Technologies // Oct 2014

    IT and Enterprise Mobility: IT is Fully Charged and Ready to Roam

    To understand what large organisations are doing on enterprise mobility, CA Technologies engaged research firm Vanson Bourne to survey 1,300 senior I.T. decision-makers at enterprise organisations across five industry verticals in 21 different countries in the US, Europe, Asia and Australia.

  • Sponsored By CA Technologies // Oct 2014

    Next Generation Performance Testing with Service Virtualisation and APM

    This report explores some of the issues with traditional APM technologies and strategies, and introduces new tools that can help overcome these issues. Discover how component-based performance testing-supported by service virtualisation and application performance management suite enables you to improve IT productivity, reduce infrastructure costs and increase efficiency of application...

  • Sponsored By CA Technologies // Sep 2014

    What you really want from Infrastructure Management

    This whitepaper explores the benefits of a complete and unified visualisation system that can monitor everything in IT operations environment, monitoring the performance, and availability of any aspect that support business services.

  • Sponsored By CA Technologies // Sep 2014

    Why Most Organisations Miss User Response Monitoring – and What to Do About It

    This guide looks at the challenges of user response monitoring, and it shows how you can overcome these challenges and start to get a real handle on your infrastructure performance and how it impacts your user’s experience.

  • Sponsored By Sophos // Sep 2014

    Firewall Buyers Guide

    Five key areas to consider when choosing your next firewall Checklist of the security capabilities you need Questions to ask vendors to make sure they meet your requirements Comparisons of Sophos, Fortinet, Dell SonicWALL and WatchGuard

  • Sponsored By Sophos // Sep 2014

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably — so it’s easy to get confused about which type of protection is right for you. This Manager’s Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

  • Sponsored By Sophos // Sep 2014

    Protecting Your Roaming Workforce With Cloud-Based Security

    Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority—security is not. IT departments must mitigate the risks of BYOD (Bring Your Own Device).

  • Sponsored By CA Technologies // Sep 2014

    Unified IT Monitoring: A Necessity in the Era of Customer

    This exclusive whitepaper details how unified IT monitoring can be used to deliver the customer experience your users demand. Read this report now to learn about a real life company that adopted unified IT monitoring and turned itself into an IT leader.

  • Sponsored By IBM // Sep 2014

    Following the Rules - Reducing the Risk

    A short article by AIIM on compliance

  • Sponsored By IBM // Sep 2014

    Buyer Brief- Improving the Management and Governance of Unstructured Data

    Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition

  • Sponsored By IBM // Sep 2014

    Information Lifecycle Governance Leader - Reference Guide

    Data is growing at unprecedented rates. But how much of it is useful to your business? Read this leader guide from the Compliance, Governance and Oversight Council (CGOC) to learn how to deal with excessive data, get more value from information assets, control costs, ensure compliance, and reduce risk.

  • Sponsored By IBM // Sep 2014

    Information Lifecycle Governance - Requirements Kit

    Data volumes are getting out of control, but choosing the right information lifecycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you need.

  • Sponsored By Webroot // Sep 2014

    Performance Benchmark Report 2014

    PassMark Software® conducted objective performance testing on 8 security software products using 13 performance metrics. Find out how Webroot’s SecureAnywhere Business Endpoint Protection product performs against 7 competitor products. Download this research to learn more.