Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • One-Minute Whitepaper: Top 8 Identity & Access Management Challenges with Your Saas Application

    We all know that the cloud is here to stay. Organizations are choosing SaaS apps at a greater scale than ever before, but this means IT teams are facing a new mix of challenges. We took a closer look at the most common pain points; these are the eight themes we found. Learn more!

  • PowerShell eBook Series: Parts 1-3

    We hope you enjoy this very resourceful ebook series on PowerShell. You’ll learn how to get started with PowerShell, the first steps within the console and how to create conditions along with many other topics. Learn more.

  • The End of The Trusted Network

    Read this Fireside Chat featuring Forrester Research director Stephanie Balaouras to find out what you can do to secure with a Zero Trust approach that improves network visibility, breach detection, and vulnerability management.

  • 6 Critical Reasons for Office 365 Backup

    Read this white paper to learn why it is important for you to take charge of Office 365 data backup in cases of accidental deletion, internal and external security threats, and legal and compliance requirements. Learn more.

  • Tackling Office 365 Deployment Challenges

    Read this Digital Dialogue to find out how you can use Ivanti technologies to make sure your migration to Office 365 is successful by having the right technologies to avoid any problems that impact users. Learn more.

  • DRaaS for Dummies

    Read DRaaS For Dummies to learn about a new easy-to-use approach to DR. After reading this book, you’ll have the foundation for deploying a solution to protect your business from disaster. Learn more.

  • Data Growth: Data Recovery's Worst Nightmare

    Read this paper to find out what IT departments can do to handle the explosion of data by decreasing storage with data deduplication provided by both your backup solution and storage hardware. Learn more.

  • Container Security - 10 Things DevOps Need to Do

    The growth of containers has led to a revolution in the way organizations develop and deploy applications. Download this eBook that reviews the 10 key things DevOps should know about securing containerized applications. Learn more.

  • 6 Critical Reasons for Office 365 Backup

    This report explores the hazards of not having an Office 365 backup in your arsenal, and why backup solutions for Office 365 fill the gap of long-term retention and data protection. Learn more.

  • 6 Critical Reasons for Office 365 Backup

    This report explores the hazards of not having an Office 365 backup in your arsenal, and why backup solutions for Office 365 fill the gap of long-term retention and data protection. Learn more.

  • Best Ways to Extend Endpoint Management and Security to Mobile Devices

    Does your endpoint management extend all the way to management of your mobile devices, like smartphones and tablets? This paper explores the best ways to enroll, inventory, configure and secure mobile devices as you do your traditional devices. Learn more.

  • Ensuring a Successful Windows 10 Migration

    Endpoint management has become increasingly complex. Besides deploying and maintaining a range of devices, operating systems and applications, you need to continually protect your network from increasing cyberthreats. Learn more.

  • Five Easy Steps to Smarter Systems Imaging

    In today’s IT environments, which are far more diverse and complex, traditional methods for imaging are simply unworkable. Learn more.

  • Replacing Brio: A Playbook for Data Analysts

    For dedicated Brio users (Hyperion Interactive Reporting), working without a net has become the new normal since Oracle terminated premium support in April 2015. But when your business is on the line, any fall can be quite risky. Learn more.

  • Enabling Agile Database Development with Toad

    Life is all about choices. You can choose to muddle through manual tasks, or you can get the e-book on automating agile database development. One choice will slowly drive you nuts, and the other will make you the MVP of your team. Save your sanity. Get this e-book.

  • Unlock the Full Potential of DevOps

    Many organizations are turning to DevOps to help them succeed in today’s intensely competitive markets by embracing Database DevOps practices. Learn more.

  • Achieving Migration Zen: The Art of Simplifying Email Archive Migrations

    Read this paper based on a Fireside Chat between email archive migration veterans Nick Cavalancia of Techvangelism and Chris Clark, CEO of Trusted Data Solutions, to learn the best ways to approach the process. Learn more.

  • NIST and Compliance: Future-Proofing Your Password Policy

    What was once best practice is now an anti-pattern. In this whitepaper, we will review the new Digital Identity Guidelines from NIST and formulate a strategy that aligns best practice with compliance needs. Learn more.

  • Securing Active Directory Against Common Attacks

    Is your Active Directory hygiene keeping you up at night? Address the low-hanging security vulnerabilities in your organization with our Active Directory best practice guidance, which includes physical security, access control, and authentication. Learn more.

  • Remedying the Email Security Gaps in Microsoft Office 365

    Why should you consider additional security protection around Microsoft Office 365 email use? And, what should you look for in a third-party solution? Read this paper and find out more!