White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By IBM // Apr 2014

    Protect the Mobile Enterprise with Smarter Security

    Mobile security, and ensuring users do the right thing, is one of the highest priorities of today’s CIOs. Although mobile employees can be more productive by working anytime and anywhere, they are now accessing corporate data and applications from outside the traditional network perimeter. This means traditional access and authentication...

  • Sponsored By IBM // Apr 2014

    Identity and Access Intelligence: Transforming the Nature of Enterprise Security

    In this paper, Enterprise Management Associates® (EMA™) analysts describe the nature of identity and access intelligence and the factors that are driving this important aspect of security evolution. Learn how Identity and Access Intelligence helps organizations rethink thier defense against a wide range of threats, cope with mobile and cloud...

  • Sponsored By IBM // Apr 2014

    IBM: Consolidated Security Management for Mainframe Clouds

    Organisations today grapple with the expansion of distributed computing, increased online collaboration, explosive data growth and heterogeneous IT environments—all issues that make information security more critical, yet more complex than ever. In this white paper, IBM takes a look at organisations who allow the mainframe to serve as an enterprise...

  • Sponsored By F5 // Apr 2014

    Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

  • Sponsored By F5 // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

  • Sponsored By F5 // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

  • Sponsored By F5 // Apr 2014

    How to Fill the Threat Management Gateway Void

    The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it’s important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and...

  • Sponsored By VMware // Apr 2014

    Top 3 Reasons for IT to Adopt Desktop Virtualization

    Driven by trends such as Bring Your Own Device (BYOD) and the consumerization of IT, organizations are increasingly adopting desktop virtualization. Even though these companies are driving down costs and improving operational efficiencies, some IT departments remain cautious and even downright skeptical about desktop virtualization. But with new hardware advancements—such...

  • Sponsored By VMware // Apr 2014

    7 key indicators that you need to extend virtualization to the desktop.

    Read this whitepaper on When It Makes Sense to Move to Desktop Virtualization to learn more about the 7 key indications that your business is ready for VDI. Find out how deploying VMware Horizon View can improve your IT infrastructure by: Giving IT easy control over data access...

  • Sponsored By VMware // Apr 2014

    Whiteboard: Delivering Desktops and Applications as a Service

    VMware® Horizon View™ makes it easy to deliver desktops and applications as a service to your end users on top of your existing vSphere™ platform. Watch this whiteboard video from VMware reference architect, Tristan Todd, for a brief lesson on how to successfully deploy View for a flexible and secure...

  • Sponsored By LogMeIn BoldChat // Apr 2014

    Mobile Customer Care: It’s More than Hype

    The customer / company relationships stand in the midst of the mobile revolution. The growing consumer adoption and use of mobile devices means that customers are increasingly incorporating mobile as part of their interactions with businesses. However, are businesses ready for this change in customer behavior? This report will illustrate...

  • Sponsored By LogMeIn BoldChat // Apr 2014

    Effective Mobile Engagement

    This report, based on the survey results with nearly six thousand respondents across ten countries, sheds light on mobile engagement, including its current state, channels in use, which industries consumers are engaging with, and how well they are doing. Additionally, it evaluates engagements for technical support vs. shopping, expectations...

  • Sponsored By VMware // Apr 2014

    Tech Tips: Storage for VMware Horizon View Virtual Desktop Infrastructure Video

    The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So...

  • Sponsored By Gigya Inc. // Apr 2014

    Navigating the New Identity Ecosystem: 3 Hurdles Facing Modern IT Professionals

    Consumer identity data is becoming increasingly unmanageable with the growth of big data and mobile, social and digital channels. Modern businesses need a better way to solve today’s identity and access management (IAM) problems that removes service maintenance and reliability burdens from IT’s shoulders. Take an in-depth look at 3...

  • Sponsored By Acquia // Apr 2014

    Liberate Your Commerce Platform without Selling the Family Farm

    This ebook offers a possible solution to businesses that already have made big investments in enterprise commerce platforms, but that also struggle to keep up with the quickly changing landscape of shopping experiences and business models. Drupal’s flexibility, scalability, and rapid deployment capability make it possible to build shiny...

  • Sponsored By Desktone // Apr 2014

    Mythbusting DaaS

    Desktops as a Service (DaaS) is the delivery of a virtual desktop offered as a hosted service by a service provider. DaaS has the potential to radically change the way desktops are purchased and managed. However, as is typical with such emerging, disruptive technologies, there is a good deal of...

  • Sponsored By Desktone // Apr 2014

    Top 5 Reasons to Deploy Desktops as a Service

    No, the personal computer isn't dead, but it looks a whole lot different than it did just a few years ago. Even though organizations need to upgrade or replace many of their client systems, those physical units increasingly are being replaced by virtual machines. Desktops as a service (DaaS) may...

  • Sponsored By Desktone // Apr 2014

    Using DaaS to Create the Ideal Desktop User Experience Without a PC

    With the ubiquity of end-user computing long established, organizations now are grappling with a tough dilemma: Users want enterprise-class performance and availability, but they demand the flexibility to use familiar devices and applications—anywhere, and at any time. Download this whitepaper to learn why Desktops as a service (DaaS) can be...

  • Sponsored By LogMeIn // Apr 2014

    How to Select the Right Remote Support Tool

    Today’s customer support and IT service organizations are charged with supporting ever-more complex environments that include multiple channels of communication to a seemingly limitless number of devices and systems—all while keeping support costs down. To meet these conflicting demands, service organizations are turning to remote support solutions. But as these...

  • Sponsored By LogMeIn // Apr 2014

    Aberdeen Group Report: Improving Engagement with Multi-Channel Service

    In Aberdeen's Trends in Customer Service 2012: Multi-Channel Edition (November 2012), only 39% of organizations reported that they had been able to drive improvements in customer satisfaction over the previous 12 months. An even lower percentage indicated success in enabling higher rates of loyalty and retention. This is not a...