-
Article
Research: Security, MDM and big data top IT leaders' priorities for next three years
The latest Tech Pro Research survey on the future of IT shows that security, mobile device management and big data are IT leaders' top priorities for the next three years.
-
Research
IT Leaders' Tech Predictions for 2015-2018
Consumers, businesses and IT professionals alike know that technology is no stranger to change. Ever since the 1980’s, when the era of home and business computing for the masses truly began, systems, ...
-
Article
The Internet of Things threatens to unleash security, privacy, and legal nightmares
The Internet of Things will complicate security, redefine privacy, and require new laws. Both business and government must rise to the challenge -- and they need to get started right now.
-
Tools & Templates
BYOD (Bring Your Own Device) Policy
Our BYOD (Bring Your Own Device) Policy describes the steps your employees must take when connecting personal devices to the organization's systems and networks. The purpose of the BYOD Policy is fou...
-
Downloads
Apple spotlight: The business potential of iPhone 6
TechRepublic and ZDNet smartphone experts discuss the features, specs, and pros and cons of Apple's new iPhone 6 and 6 Plus. Find out about battery life, ease of repair, and viability for business use...
-
Article
When Haswell met Xeon
Intel's new Xeon E5 v3 family of server and workstation CPUs, based on the 22nm Haswell architecture, runs the gamut from budget 6-core chips to an 18-core behemoth. We outline what's new and look at ...
-
eBooks
BYOD spotlight: Mitigating risk and implementing policies and solutions
BYOD means freedom of device choice for business users, but it can also unleash an avalanche of security concerns. This ebook will help you sort out the risks and take the right steps to contain them....
-
eBooks
Cybersecurity spotlight: The critical labor shortage
An escalating shortage of information security professionals is prompting industry experts to predict a grave outcome. Violet Blue explores the infosec labor shortage and its causes and consequences. ...
-
Article
Setting up two-factor authentication on Office 365
If you're serious about security, you can't afford to protect your business files and emails with just a password. Ed Bott explains how to use your smartphone to ensure that only you can get access.
-
Article
Transitioning from Windows to Linux Administration: A guide for newcomers, Part III
Windows and Linux are operating systems with many similarities and differences. Learn some tips to help cross the bridge between the two in the conclusion of a multi-part series.
-
Tools & Templates
Employee Privacy Policy
Our Employee Privacy Policy describes the organization's employee privacy guidelines and outlines employee privacy expectations.
-
Tools & Templates
Outsource Provider Security Policy
TechRepublic's Outsource Provider Security Policy will help you outline the requirements for safely outsourcing your organization's operations, systems, and data.
-
Tools & Templates
Telecommuting Policy
Our Telecommuting Policy describes the organization's guidelines and process for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data for the purpose...
-
Tools & Templates
Travel and Entertainment Expense Policy
Our Travel and Entertainment Expense Policy will help you define your organization's policies and procedures for incurring and receiving reimbursement for travel and entertainment expenses. It provide...
-
Research
BYOD Business Strategies: Adoption Plans, Deployment Options, IT Concerns, and Cost Savings
TechRepublic's BYOD Business Strategies: Adoption Plans, Deployment Options, IT Concerns, and Cost Savings report reveals the BYOD plans of over 1,000 IT decision makers worldwide.
-
Analyst Briefings
Analyst briefing: BYOD empowers users but challenges traditional IT
IT leaders are finding ways to capitalize on the benefits of BYOD while reducing its risks. This analysis examines the impact of BYOD and looks at how organizations are dealing with the trend.
-
Analyst Briefings
Analyst briefing: Laying the groundwork for successful cloud deployment and management
This cloud strategy analysis describes current deployment and service models and looks at the key characteristics of cloud service offerings, such as performance, reliability, and compliance.
-
Analyst Briefings
Analyst briefing: Conducting a cloud solution risk assessment
This briefing provides a 10-step assessment process for determining potential areas of vulnerability, mitigating risk, and implementing a comprehensive cloud management strategy.
-
Research
IaaS Research: Leaders Share Cloud Strategies for the 21st Century Data Center
TechRepublic's infrastructure-as-a-service (IaaS) survey reveals what companies say about current and future plans for the cloud, top vendors and business drivers leading them to the cloud.
-
eBooks
SaaS and the cloud: A primer for IT pros
This primer covers a wide range of topics to help you reap the benefits of the cloud while avoiding potential problems, such as security risks, performance issues, and vendor lock-in.
-
Article
Research: Security, MDM and big data top IT leaders' priorities for next three years
The latest Tech Pro Research survey on the future of IT shows that security, mobile device management and big data are IT leaders' top priorities for the next three years.
-
Article
The Internet of Things threatens to unleash security, privacy, and legal nightmares
The Internet of Things will complicate security, redefine privacy, and require new laws. Both business and government must rise to the challenge -- and they need to get started right now.
-
Tools & Templates
Employee Privacy Policy
Our Employee Privacy Policy describes the organization's employee privacy guidelines and outlines employee privacy expectations.
-
Tools & Templates
Outsource Provider Security Policy
TechRepublic's Outsource Provider Security Policy will help you outline the requirements for safely outsourcing your organization's operations, systems, and data.
-
Tools & Templates
Telecommuting Policy
Our Telecommuting Policy describes the organization's guidelines and process for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data for the purpose...
-
Tools & Templates
Travel and Entertainment Expense Policy
Our Travel and Entertainment Expense Policy will help you define your organization's policies and procedures for incurring and receiving reimbursement for travel and entertainment expenses. It provide...
-
Research
BYOD Business Strategies: Adoption Plans, Deployment Options, IT Concerns, and Cost Savings
TechRepublic's BYOD Business Strategies: Adoption Plans, Deployment Options, IT Concerns, and Cost Savings report reveals the BYOD plans of over 1,000 IT decision makers worldwide.
-
Analyst Briefings
Analyst briefing: BYOD empowers users but challenges traditional IT
IT leaders are finding ways to capitalize on the benefits of BYOD while reducing its risks. This analysis examines the impact of BYOD and looks at how organizations are dealing with the trend.
-
Analyst Briefings
Analyst briefing: Laying the groundwork for successful cloud deployment and management
This cloud strategy analysis describes current deployment and service models and looks at the key characteristics of cloud service offerings, such as performance, reliability, and compliance.
-
Analyst Briefings
Analyst briefing: Conducting a cloud solution risk assessment
This briefing provides a 10-step assessment process for determining potential areas of vulnerability, mitigating risk, and implementing a comprehensive cloud management strategy.
























