White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Virtualization policy

    Tools & Templates // Dec 2018 // provided by Tech Pro Research

    Virtualization platforms are available from a number of vendors, but it’s still critical to maintain your virtualization environment to avoid unnecessary resource consumption, out of-compliance systems or applications, data loss, security breaches, and other negative outcomes. This policy defines responsibilities for both end users and the IT department to ensure...

    View This Now
  • IT staff systems/data access policy

    Tools & Templates // Oct 2018 // provided by Tech Pro Research

    IT pros typically have access to company servers, network devices, and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy offers guidelines for governing access to critical systems and confidential data. From the...

    View This Now
  • Machine automation policy guidelines

    Tools & Templates // Sep 2018 // provided by Tech Pro Research

    Many industries rely on machine automation to save money and reduce risk. However, along with the benefits comes the critical need to implement policies for its proper use. This set of guidelines will help your organization keep its machine automation safe, reliable, and in compliance. From the guidelines: ...

    View This Now
  • IT training policy

    Tools & Templates // Jul 2018 // provided by Tech Pro Research

    Successful IT departments are defined not only by the technology they deploy and manage, but by the skills and capabilities of their people. IT workers must stay up to date with the latest technology trends and evolutions, as well as soft skills, like project management, presentation and persuasion, and general...

    View This Now
  • End user data backup policy

    Tools & Templates // Jun 2018 // provided by Tech Pro Research

    Data without an associated backup is only as reliable as the system upon which it is stored—and every system has a finite lifespan or may be susceptible to malware or hacking efforts. This policy offers guidelines for implementing manageable and reliable backups for user data. From the policy: ...

    View This Now
  • Software licensing policy

    Tools & Templates // Jun 2018 // provided by Tech Pro Research

    Organizations spend a fortune on software licenses every year, and a lack of management around it can result in heavy fines. This policy will help you establish guidelines to make sure you're in compliance and that any audits will be painless. From the policy: Staying in compliance with...

    View This Now
  • Cloud computing policy

    Tools & Templates // May 2018 // provided by Tech Pro Research

    This policy provides guidelines for secure and effective cloud computing operations to ensure the integrity and privacy of company-owned information. From the policy: The list of advantages to cloud computing includes lowered operational costs, greater technological flexibility, and the ability to rapidly implement new systems or services. Gains in business...

    View This Now
  • Software automation policy guidelines

    Tools & Templates // Apr 2018 // provided by Tech Pro Research

    Software automation is used for many business and IT processes, depending on industry vertical and individual company business and IT needs. Because this automation is far-reaching, policy considerations touch on many areas. This set of guidelines will help you cover all the bases as you build a comprehensive software automation...

    View This Now
  • Password management policy

    Tools & Templates // Mar 2018 // provided by Tech Pro Research

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    View This Now
  • IT physical security policy

    Tools & Templates // Mar 2018 // provided by Tech Pro Research

    This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: Physical security guidelines and requirements The following guidelines should be followed in designing...

    View This Now