Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Protecting the Extended Perimeter With GlobalProtect Cloud Service

    Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Find out more.

  • Decryption - Why, Where and How

    Read this paper to learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business. Learn more.

  • Protecting Developer Environments with VM Series on AWS

    The move to AWS is enabling many organizations to adopt a more agile, iterative application development methodology. Learn more.

  • Palo Alto Networks Traps - A Key Tool for GDPR Compliance

    The General Data Protection Regulation (GDPR) is a new data protection regulation from the European Union. GDPR aims to improve controls for protecting the personal information of EU residents. It is stricter and simultaneously broader in scope than the 1995 Data Protection Directive, which it replaces. Learn more.

  • Stop Targeted Attacks Without Decryption

    Threat actors conceal their attacks in SSL traffic to evade corporate defenses. Palo Alto Networks Security Operating Platform provides ironclad protection against cyberattacks, while eliminating blind spots introduced by encrypted traffic. Find out more.

  • Protecting Office 365 With Veeam Cloud Backup

    Read this white paper to find out what you can do to protect your Office 365 data from events including ransomware attacks, loses due to user errors or malfeasance, and legal requirements for providing specific files. Learn more.

  • Protecting Office 365 With Veeam Cloud Backup

    Read this white paper to find out what you can do to protect your Office 365 data from events including ransomware attacks, loses due to user errors or malfeasance, and legal requirements for providing specific files. Learn more.

  • 10 Key Features You Need in a Service Desk Solution

    Keeping users happy and boosting IT productivity is easier than you think when you have an effective service desk tool. Read this paper to discover the ten key features to look for in a service desk solution. Learn more.

  • Ensuring A Successful Windows 10 Migration

    Windows 10 is here, so it’s time for you and your organization to migrate. Migrating to Microsoft’s newest OS can be a tricky and time-consuming process, but we can help you simplify it. In this white paper, we share the key tips and activities for transition that will make your life easier. Learn more.

  • Ensuring A Successful Windows 10 Migration

    Windows 10 is here, so it’s time for you and your organization to migrate. Migrating to Microsoft’s newest OS can be a tricky and time-consuming process, but we can help you simplify it. In this white paper, we share the key tips and activities for transition that will make your life easier. Learn more.

  • Quest Facing the Endpoint Reality

    Unified Endpoint Management - How it can help organizations address the challenges of digital transformation.

  • Guide to Securing Microsoft Office 365 for the Enterprise

    The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. Learn more.

  • VM Optimization Find the Balance

    Your guide to right-sizing and waste-finding in the virtual environment.

  • 10 Tips for Selecting a Managed Security Service Provider (MSSP)

    Most businesses have trouble keeping up with today’s constant barrage of cyber threats. Many are turning to MSSPs (managed security services providers) to protect their networks cost-effectively and reliably. But choosing an MSSP requires thought and research. Not all offer the same levels of protection, so you should focus your search on a provider with a solid track record and reputation. In this whitepaper, you'll read about 10 best practices to follow when selecting an MSSP.

  • How Hyper-Converged Infrastructure Helps Business Meet the Challenges of Tomorrow

    More than 10,000 customers are using VMware vSAN to quickly adopt hyper-converged infrastructure to accelerate their IT modernization initiatives, reduce their total cost of ownership, and increase their businesses agility in preparation of future needs. Read some of their stories and see how hyper-converged infrastructure powered by vSAN can ease the burden of infrastructure management and create new possibilities for your business.

  • What’s Next for Hyper-Converged Infrastructure: 4 Powerful HCI Use Cases for 2019

    The reality is that IT teams have been so pleased with the benefits they are already reaping with HCI that they are looking for new ways to use it to power key initiatives such as digital transformation. In this white paper, we look at five of the critical use cases currently driving HCI deployments and why they will continue to benefit from HCI in 2019 and beyond.

  • A Guide to Better TCO and Agility with Hyper-Converged Infrastructure

    ​Hyper-converged infrastructure is spearheading the success of the digital transformation by enabling faster response rates in organizations. This whitepaper gives an overview of the benefits of HCI and how it can help companies achieve their goals through lowering costs and creating agile IT environments.

  • Unitrends vs Veeam: How to Choose the Best Solution to Meet Your Backup and Recovery Requirements

    Veeam or Unitrends? For many IT admins, the choice of which backup and recovery solution is best for their company comes down to these two companies. The choice can be confusing as both seem to offer similar features. However, when you look closely, the details vary greatly and that knowledge can guide backup admins to making the best decision. This paper outlines each company’s offerings, describes features and architectural guidelines and ultimately identifies whether Veeam or Unitrends makes the most sense for a situation.

  • Supporting and Simplifying Secure Cloud Access and Provisioning with a Federated Identity and Directory Service

    Read this Game Changer to find out how to build a virtual identity hub that can inventory data sources, integrate identity to create a global list of users and more. Learn more.

  • 6 Discoveries IT Security Pros Need to Know about SSL Inspection

    Threat actors are evolving. They are leveraging SSL-based encryption to hide malicious activity from existing security controls. To shed light on this emerging threat, A10 Networks commissioned the Ponemon Institute to conduct an exclusive study that evaluates threats hiding in SSL traffic, barriers for implementing decryption controls and features for decryption solution selection. Learn more.