White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • DDoS Extortion Battle Checklist

    White Papers · Aug 2021 · Provided By Akamai

    Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming, and financial services. Is your organization prepared to respond if you’re a target of a DDoS extortion group? In our new security checklist, learn the key responses organizations should take if...

    Download Now
  • Gartner Market Guide for DDoS Mitigation Services

    White Papers · Aug 2021 · Provided By Akamai

    According to Gartner, enterprises should “determine their risk level, and pay accordingly for DDoS mitigation services.” The Gartner 2020 Market Guide for DDoS Mitigation Services provides important insights into the differences among scrubbing center, CDN, CSP, and IaaS solutions — and when to consider each. Analyses of various scrubbing center...

    Download Now
  • DDoS Extortion Battle Checklist (Spanish)

    White Papers · Aug 2021 · Provided By Akamai

    Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming, and financial services. Is your organization prepared to respond if you’re a target of a DDoS extortion group? In our new security checklist, learn the key responses organizations should take if...

    Download Now
  • DDoS Extortion Battle Checklist (Portuguese)

    White Papers · Aug 2021 · Provided By Akamai

    Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming, and financial services. Is your organization prepared to respond if you’re a target of a DDoS extortion group? In our new security checklist, learn the key responses organizations should take if...

    Download Now
  • Vendor Access Policy

    Tools & Templates · Aug 2021 · Provided By TechRepublic Premium

    It’s common for third party vendors to require access to company systems, resources or facilities in order to provide service or maintenance, support company functions and personnel or engage in security or monitoring endeavors. Whether on-premises or cloud-based resources, vendor access should be carefully regulated with access allowed only to...

    View This Now
  • 2021 Data Exposure Report, Volume II

    White Papers · Aug 2021 · Provided By Code42

    Cut the Cord: DLP and CASB solutions don’t combat today’s Insider Risk Security leaders across the industry know they need a more nuanced strategy than simply looking at good versus bad actions, and they know their teams will never actually reduce risk while living in the forced “maintenance mode” of...

    Download Now
  • Hiring Kit: Marketing Manager

    Tools & Templates · Aug 2021 · Provided By TechRepublic Premium

    Just because an organization objectively produces the best product on the market or provides superior service for its customers does not mean that the organization is also guaranteed success. In a crowded and global marketplace, organizations have to step out and above the competition with an effective strategic marketing scheme....

    View This Now
  • Top 3 Linux desktops for enterprise businesses

    Tools & Templates · Aug 2021 · Provided By TechRepublic Premium

    If your business is either considering or planning a migration to Linux desktops, you might be wondering which distributions are your best options. Given how many Linux distributions are available, that decision may seem like an insurmountable hurdle. It’s not. In fact, once you weed out the distributions that aren’t...

    View This Now
  • ForresterNow Predictions 2021: Edge Computing

    White Papers · Aug 2021 · Provided By Akamai Technologies

    Edge computing is no longer an idea. It’s an opportunity. You can now push computing power closer to where it’s used and take advantage of emerging low-latency, geospecific use cases. And business models are emerging to help developers build production applications and deploy them at the edge, without adding servers...

    Download Now
  • Selecting Winning Solutions for Secure Network Transformation

    White Papers · Aug 2021 · Provided By TATA Communications

    Now more than ever, is a critical time for enterprises to consider planning their migration strategies to optimize and right size their network architecture as we move to an inevitable cloud-first world. The future is about cloud-to-cloud connectivity of workloads and data through a mesh of public and private networks,...

    Find Out More