White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

White Papers by Topic

  • Sponsored By Vormetric // Jan 2015

    Meeting Payment Card Industry Data Security Standard 3.0 Requirements

    Merchants, large and small, face the high risk of data breaches arising from inadequate security controls that leak or allow access to sensitive cardholder data. The Payment Card Industry Data Security Standard was developed with the intent of reducing the risk of handling cardholder data by creating compliant Cardholder Data...

  • Sponsored By Vormetric // Jan 2015

    Vormetric Tokenization with Dynamic Data Masking - PCI DSS 3.0

    For too many IT organizations, complying with the Payment Card Industry Data Security Standard (PCI DSS) and corporate security policies has been far too costly, complex, and time consuming. Now, Vormetric offers a better way - Vormetric Tokenization with Dynamic Data Masking helps your security team address its compliance objectives...

  • Sponsored By HP // Jan 2015

    How to re-architect your network for BYOD

    This whitepaper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks. Download now and find out how a re-architected network- flexible and scalable- makes BYOD easier to secure and manage, yet...

  • Sponsored By HP // Jan 2015

    Five Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper and...

  • Sponsored By HP // Jan 2015

    Why HP 3PAR StoreServ Storage for Client Virtualization and best practices

    The rising demands on infrastructure, coupled with diminishing IT budget has caused major concerns for IT administrators such as infrastructure and maintenance complexity, mobile and remote access needs, security and disaster recovery, cost containment directives, and user productivity requirements. This technical report explores a storage solution with client virtualisation that...

  • Sponsored By LogMeIn // Jan 2015

    TSIA 2014 Remote Support Trends

    Based on information gathered in TSIA’s annual Global Technology Survey, this report will look and the trend of remote support services being adopted over many different industry types. Through the continued improvement of remote control, desktop sharing and web collaboration, companies are able to use these capabilities to increase productivity...

  • Sponsored By LogMeIn // Jan 2015

    Harvard Business Review: The Truth about your Customer's Experience

    While Companies often focus on the individual interactions with their customers to ensure that they are satisfied with the service provided to them in that interaction, the companies can often fall short when looking at the at the complete journey of that customer on their way to purchase and beyond....

  • Sponsored By LogMeIn // Jan 2015

    TSIA 2014 Report: The State of Support Services

    Looking back at 2014 and the major changes in support services. TSIA identifies what they see as the ‘New World for B4B’, with companies around the world making changes to the way they are structured and how they operate. What new capabilities will be added to the arsenal of support...

  • Sponsored By IBM // Jan 2015

    Putting Mobile First: Best Practices of Mobile Technology Leaders - Japanese

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

  • Sponsored By IBM // Jan 2015

    IT Mobile Worksyle Innovation - Japanese

    Download this resource and learn how the Mobile IT environment have change in the last years.

  • Sponsored By LogMeIn // Jan 2015

    Selecting the Right Remote Support Solution Tool for your company

    This provides an overview of all the questions that need to be asked when looking at your companies help desk. How to maintain flexibility, simplicity, lower costs while ensuring that your remote support solution allows your support agents to perform advance support task quickly and across multiple platforms and devices....

  • Sponsored By Symantec // Jan 2015

    Datasheet: Symantec™ Email Security.Cloud

    Symantec™ Email Security.cloud filters unwanted messages and protects mailboxes from targeted attacks. The Email Security SLA provides an aggressive set of metrics to protect corporate data. Symantec™ Email Security.cloud provides various features like: • Cloud Security Platform • Email Antivirus and Email Antispam • Email Data Protection • Email Image...

  • Sponsored By IBM // Jan 2015

    Forrester Report: Bring ROI to your BYOD - Japanese

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

  • IBM

    Sponsored By IBM // Jan 2015

    Forrester Engage Audit Professionals For Better Security Assessment Outcomes

    Read this report from Forrester Research to learn how to take advantage of your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program. Read More..

  • Sponsored By HP // Jan 2015

    Grow your small or midsize business with a scalable network

    Small and midsize businesses need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT...

  • Sponsored By HP // Jan 2015

    Re-architect your network for BYOD

    This whitepaper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks. Download now and find out how a re-architected network- flexible and scalable- makes BYOD easier to secure and manage, yet...

  • Sponsored By HP // Jan 2015

    Magic Quadrant for Deduplication Backup Target Appliances

    Deduplication backup target appliances have played an instrumental role in reducing or eliminating tape for backup. This research will help storage professionals shortlist 11 vendors that offer such solutions.

  • Sponsored By HP // Jan 2015

    Questions to Consider When Selecting an All-Flash Array

    All-flash arrays have become one of the top choices for improving storage, but with so many options out there it can be difficult to choose the right solution to fit your organisational needs. This exclusive whitepaper breaks the process down into four major categories such as performance, resiliency, efficiency, and...

  • Sponsored By HP // Jan 2015

    The Questions to Consider When Selecting an All-Flash Array

    All-flash arrays have become one of the top choices for improving storage, but with so many options out there it can be difficult to choose the right solution to fit your organisational needs. This exclusive whitepaper breaks the process down into four major categories such as performance, resiliency, efficiency, and...

  • IBM

    Sponsored By IBM // Jan 2015

    Extreme File Transfer: Bigger, Faster, Farther

    Read this e-book from Aberdeen Group to learn about extreme file transfer, and discover the solutions that can help you send information faster, enable worldwide access, and automate workflows to drive seamless file transfer. Read More..