White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • The 6 Business and Security Benefits of Zero Trust

    White Papers // Dec 2018 // provided by Akamai Technologies

    Zero Trust Delivers 6 Security and Business Benefits Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security...

    Learn More
  • Remote Access Redefined: Managing the Rise of Third-Party Users

    White Papers // Dec 2018 // provided by Akamai

    IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined...

    Learn More
  • 5 Reasons Enterprises Need a New Access Model

    White Papers // Dec 2018 // provided by Akamai

    Traditional remote access technologies—like VPNs, proxies and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies...

    Download Now
  • Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk

    White Papers // Dec 2018 // provided by Akamai

    A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an...

    Download Now
  • Remote Access and Security Challenges & Opportunities

    White Papers // Dec 2018 // provided by Akamai

    Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: The complexity faced in implementing remote...

    Download Now
  • 5 Must-Ask DNS Questions

    White Papers // Dec 2018 // provided by Akamai

    Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you...

    Get It Today
  • Enabling Single Sign-On Across All Application Types 

    White Papers // Dec 2018 // provided by Akamai

    Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and efficiency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business...

    Find Out More
  • Why Moats And Castles Belong In The Past

    White Papers // Dec 2018 // provided by Akamai

    The moat-and-castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. With EAA there is a new way more simple, secure, and convenient way to protect the enterprise. Find out more by reading this whitepaper now!

    Read More
  • Enforce a Zero Trust Security Model in Today's Hostile Environment

    White Papers // Dec 2018 // provided by Akamai

    Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile...

    Download Now
  • The Essential Elements to Consider for Micro-Segmentation: The Definitive Guide

    White Papers // Dec 2018 // provided by GuardiCore

    Cybersecurity professionals are tasked to make organizations both safe and agile. This dual mandate means selecting technologies that reduce the complexity of operations, but without compromising security. Therefore, security must not only leverage existing investments, it must also support future development and emerging technologies. As micro-segmentation grows in...

    Download Now