White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Recognising a Breach in Your Network

    Ebooks // Oct 2017 // provided by Gigamon

    Historically, companies believed that if you threw enough technology against the network perimeter, you could stop malware or intruders. That’s no longer the case. Download this article to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage ...

    Find Out More
  • Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture

    Research // Oct 2017 // provided by Gigamon

    Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organisation’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and ...

    Download Now
  • Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats

    Research // Oct 2017 // provided by Gigamon

    You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn ...

    Read More
  • Understanding the State of Network Security Today

    White Papers // Oct 2017 // provided by Gigamon

    Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities ...

    View This Now
  • Beyond Agility: The CIO's guide to enterprise transformation with cloud

    Videos // Oct 2017 // provided by IBM

    The cloud revolution is here. Five years ago, enterprises were implementing cloud primarily to streamline IT infrastructure and cut costs. Today, enterprises around the world have adopted cloud to go beyond acquiring technological agility — to power business innovation.

    Watch Now
  • What you really need to know about Hybrid Cloud

    White Papers // Oct 2017 // provided by IBM

    There are widely divergent points of view on how cloud can and should be used to support your enterprise. That’s an essential discussion to have, because which cloud strategy you adopt—and how you implement it— can be a deciding factor in accelerating business results. Creating a hybrid cloud environment that ...

    Download Now
  • Gartner Magic Quadrant Report for Mobile Services

    White Papers // Oct 2017 // provided by IBM

    CIOs require high security and data protection in a mobile vendor, as well as deep expertise. This report from Gartner Group evaluates mobile providers that demonstrate leadership on two critical elements -- ability to execute and completeness of vision. Gartner highlights IBM's application strength -- specifically in application store management, ...

    Download Now
  • Magic Quadrant for Global Digital Marketing Agencies 2017

    White Papers // Oct 2017 // provided by IBM

    As marketing’s role expands, particularly in the delivery of data-driven, customer-centric initiatives that enhance customer experience and drive revenue, so do the demands marketers place on their agency partners. According to Gartner, marketing leaders invest 22% of their marketing budgets on outsourced services. Selecting the right global marketing agency for ...

    Download Now
  • Digital Transformation Demands Zero Trust

    White Papers // Oct 2017 // provided by Akamai

    While traditional perimeter-based security models have served Enterprises well in the past, they are increasingly losing their effectiveness when applied to modern workloads and topologies. And no one knows this better than cyber criminals. Learn why adopting a zero trust security model can provide security while removing traditional performance hurdles.

    Find Out More
  • eBook: O'Reilly Zero Trust Networks

    White Papers // Oct 2017 // provided by Akamai

    Akamai has partnered with O’Reilly Media to give you two chapters from their new book “Zero Trust Networks: Building Secure Systems in Untrusted Networks” for FREE. You’ll get a comprehensive overview of the zero trust model, a method that turns the concept of the traditional network perimeter on its head. ...

    Read More