TechRepublic Premium offers the fastest and smartest way to solve the toughest problems in IT today. Subscribe and get access to our full library. Find out more here.

  • A rich selection of premium content from IT Industry leaders, from original research to exclusive articles to customizable tools and templates

  • Hundreds of time saving tools and templates, ready for you to download and customize

  • Comprehensive eBooks full of the best content from TechRepublic and ZDNet

Subscribe Today

To learn more about TechRepublic Premium and to read about the full subscription details, click here.

or
Log In

Today on TechRepublic Premium

  • Downloads
    August 2019 by TechRepublic Premium
    Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in a routine fashion to reduce risk and unnecessary...
    Download Now
  • White Papers
    August 2019 by TechRepublic Premium
    Every industry, including the industry of government, is facing digital disruption. Seventy-five percent of government leaders say traditional business models are not sustainable in the current environment. The public expects the agility and efficiency found in the private sector, and...
    Download Now
  • White Papers
    August 2019 by TechRepublic Premium
    Every industry, including the industry of government, is facing digital disruption. Seventy-five percent of government leaders say traditional business models are not sustainable in the current environment. The public expects the agility and efficiency found in the private sector, and...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    Successfully finding and recruiting suitable candidates for Security Analyst requires a well thought out plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Security Analyst in...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers, and other encryption systems to protect sensitive data. It can be a difficult position to fill. Using this hiring kit as a template you can find,...
    Download Now
  • Research
    February 2015 by TechRepublic Premium
    Security and privacy were top issues in 2014, and so Tech Pro Research conducted a survey to find out what companies are planning for 2015. Now more than ever, security and privacy protections are of paramount concern for both companies...
    Download Now
  • eBooks
    February 2015 by TechRepublic Premium
    Get more out of Windows 8.1 by mastering its powerful features and customizing it to suit your needs. Windows guru Greg Shultz shares some of his favorite tips -- plus a few gotchas to watch out for. This ebook explains...
    View this now
  • eBooks
    February 2015 by TechRepublic Premium
    Get the details on the most recent Windows 10 Technical Preview. Industry experts Ed Bott, Mary Jo Foley, and Greg Shultz share what they've learned about features, versions, and future functionality. Topics include: What's working; what's in the works Windows...
    View this now
  • Tools & Templates
    February 2015 by TechRepublic Premium
    System or network vulnerabilities and security threats can severely impact business operations or even shutter its doors. However, these incidents can be prevented by proactively detecting potential threat opportunities. Penetration tests and scans can be conducted both inside the organization...
    View this now

Featured Downloads

  • Downloads
    August 2019 by TechRepublic Premium
    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    Recruiting candidates with advanced software engineering experience and a least some familiarity with applied blockchain technology will take time and effort. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate...
    Download Now
  • Tools & Templates
    August 2019 by TechRepublic Premium
    Cybersecurity demands and the stakes of failing to properly secure systems and networks are so great that many information technology security professionals are considering surrender. According to a recent survey and analysis conducted by ZDNet, information security professionals report being...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    Finding and recruiting qualified candidates for an open computer vision engineer position will take time and concerted effort backed by a solid plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately...
    Download Now
  • Tools & Templates
    October 2018 by TechRepublic Premium
    IT pros typically have access to company servers, network devices, and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy offers guidelines for governing...
    View this now
  • Downloads
    November 2014 by TechRepublic Premium
    Download this comprehensive guide that is a compilation of the three-part series, Transitioning from Windows to Linux Administration, previously published on Tech Pro Research. The series looks at the history of Linux and how it has grown into an essential...
    Download Now
  • Tools & Templates
    December 2014 by TechRepublic Premium
    Domain Name System, or DNS, is the veritable backbone of internet communication. It translates computer names into the network (IP) addresses they represent for easy and fault-tolerant access. For instance, rather than enter an unremarkable series of numbers such as...
    View this now
  • Tools & Templates
    November 2016 by TechRepublic Premium
    This policy provides guidelines for reclaiming and reusing equipment from current or former employees. It outlines the steps that must be carried out by authorized individuals before this equipment can be considered safe to reassign. From the policy: Summary To...
    View this now