White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Understanding the State of Network SecurityToday

    White Papers // Oct 2017 // provided by Gigamon

    Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a ...

    Learn More
  • Addressing the Threat Within: Rethinking Network Security Deployment Report

    White Papers // Oct 2017 // provided by Gigamon

    Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. ...

    Download Now
  • Harnessing the Power of Metadata for Security

    White Papers // Oct 2017 // provided by Gigamon

    Download the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power. Metadata is data about data or put another way, a kind of summary or high-level view of data. By providing security tools with summary takes of the packet ...

    Find Out More
  • Why You Need A Cloud Perimeter For Agile, Innovative, And Lean It And Security

    White Papers // Oct 2017 // provided by Akamai

    "To deliver standout digital experiences for your customers and workforce, your business needs to operate with agility and speed to drive simplicity and innovation. This necessitates more permeable infrastructures, increased connectivity, open lines of communication, and unhindered application access — from anywhere, on any device, at any time."

    Learn More
  • Safeguard Your Business For Digital Transformation 5 Steps To Starting Your Cloud Perimeter Journey

    White Papers // Oct 2017 // provided by Akamai

    Businesses that pursue digital transformation will be rewarded, but not without facing challenges with their ever-expanding attack surface as well as their existing network and security architectures. Successful transformation will require the evolution of traditional enterprise network, security, and application delivery architectures.

    Find Out More
  • eBook: O'Reilly Zero Trust Networks

    White Papers // Oct 2017 // provided by Akamai

    Akamai has partnered with O’Reilly Media to give you two chapters from their new book “Zero Trust Networks: Building Secure Systems in Untrusted Networks” for FREE. You’ll get a comprehensive overview of the zero trust model, a method that turns the concept of the traditional network perimeter on its head. ...

    Read More
  • Digital Transformation Demands Zero Trust

    White Papers // Oct 2017 // provided by Akamai

    While traditional perimeter-based security models have served Enterprises well in the past, they are increasingly losing their effectiveness when applied to modern workloads and topologies. And no one knows this better than cyber criminals. Learn why adopting a zero trust security model can provide security while removing traditional performance hurdles.

    Find Out More
  • Frost & Sullivan: Think Your Business Can’t Afford to Implement Flash Storage?

    White Papers // Oct 2017 // provided by IBM

    Storage growth consistently ranks among the top data center concerns cited by IT leaders in a Frost & Sullivan annual survey. If the issue were simply one of volume, storage administrators would just load the data onto tape and send it to an offsite vault. Instead, enterprises want to unlock ...

    Download Now
  • Gala Leisure Case Study

    White Papers // Oct 2017 // provided by IBM

    After splitting from its parent company, Gala Leisure found that its inherited IT systems were over-sized and required expensive third-party support. The company implemented an IBM storage solution-enabling standardized support, lowering costs by 52% and delivering a 57% increase in application performance.

    Read More
  • Security Delivery Platforms: Dummies Guide

    White Papers // Oct 2017 // provided by Gigamon

    Security tools can&#39t inspect what they can&#39t see. To defend against today&#39s advanced threats, IT organizations require real&#8211time visibility across their entire IT infrastructure&#8211including physical, virtual, and cloud environments. In short, they need a security delivery platform. Download this book to discover how to: ...

    Download Now