Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • CISSP Exam Study Guide

    Want to become a Certified Information Systems Security Professional? Download an eBook that will help you pass the CISSP exam: sample questions, summaries of all 8 CISSP domains and more! Read on.

  • Windows 10 Migration Tips, Tricks, and Strategies

    Read this Digital Dialogue focused on how to do a successful Windows 10 migration in a centralized and automated way by following procedures to centralize management of users’ personal settings, and migrate user files. Read on.

  • The Definitive Guide to Backup for G Suite

    You’ve found the perfect cloud-based productivity suite in G Suite. Now you just need to find a way to keep your data safe from loss. Wait. What? Doesn’t Google have data protection covered? Well, yes and no. Read on.

  • Three-Step Guide to Protecting Data in G Suite

    With G Suite, it’s easy to handle your day-to-day email and schedule, share documents and collaborate with others, and store information. It’s also easy to lose all that information – by deleting something by accident, perhaps, or clicking on a malware link in an email. If so, it’s on you to fix it. Learn more.

  • Managing Users and Authentication With On-Premises Active Directory for O365

    The adoption of O365 creates user management and authentication challenges. A centralized approach leveraging the on-premises Active Directory can circumvent these issues. This report compares Microsoft tools with third-party tools for managing Active Directory on-premises for O365. Read more.

  • ROBOs at Risk: Ensure Availability to Mitigate Vulnerability

    Remote office/branch office (ROBO) locations have long suffered from neglect when it comes to IT — out of sight, out of mind. Not prioritized, ROBOs are getting attention only when something is seriously wrong. However, ROBO environments handle mission-critical data just like the rest of the organization, and therefore data management must be treated equally important. Learn more.

  • DRaaS For Virtual Machines in the Modern Data Center

    Read this report to learn about Disaster Recovery as a Service for VMs including everything you need to know about Recovery Time Objective (RTO) and Recovery Point Objective (RPO), Continuous Data Protection (CDP), and more. Learn more.

  • Your Teams Can’t Talk If Your Tools Don’t

    Read this Collaboration eBook to learn about technology that helps employees feel connected to their team regardless of their location, gets the job done better, and inspires teamwork and creativity. Learn more.

  • Are You Future-Proofing Your Future-Proofing

    Read this eBook to help you plan for Future-Proofing including looking at your current status, planning for where you want to go in the future, and putting a dedicated professional in charge. Learn more.

  • Best Practices for Protecting Against Phishing, Ransomware, and Email

    Learn ten best practices you should consider to better protect your systems and network; train your users to be security-aware; and safeguard your organization’s sensitive and confidential data from phishing attacks, ransomware, and CEO fraud. Learn more.

  • GameChanger Report: Game Changing Solutions for SaaS Management

    Read this report to learn why adopting SaaS applications is so important, challenges around managing user credentials as the number of cloud apps increases, how identity and access management is critical to mesh cloud technology with existing business processes. Read on!

  • Digital Dialogue: Creating Consistency Out of Chaos

    Learn how the issues of educational IT department can be addressed with SmartDeploy, a computer imaging solution focused on a centralized, single image management solution that saves educational organizations time and money. Read on!

  • Backup and Disaster Recovery: What You Need to Know About Data Reduction Techniques!

    It seems that sometimes data deduplication is a panacea, but in fact it is not. This paper examines the trade-offs between data reduction techniques and the business value associated with the use of backup data for purposes other than backup restoration. Learn more.

  • Workflow Hero: Scaling Process Automation Enterprise-Wide Through Citizen Development

    This paper describes Rogers Communications’ citizen development program and approach (called ‘Workflow Hero’), and provides a set of recommendations for others considering or implementing similar automation programs. Learn more.

  • How Druva Closes the Gap in Office 365 Data Protection

    Read this paper to find out about Druva solutions for data protection including endpoints data protection, cloud application backup and archiving, data compliance monitoring, and legal hold management and eDiscovery enablement. Learn more.

  • Evolution and Convergence: Hybrid Data

    Read this paper to learn how database technology is evolving including ways hardware advances play a role, the importance of standards, and the end of hand-designed schemas, hand-tuned queries, and discrete “silos.” Learn more.

  • Infographic - Brilliant User Experience Designed for the Digital

    View this infographic to see how integrated and complementary technologies provide simplicity, scalability, performance and cost savings in delivering high-performance virtual applications and desktops for the best possible user experience. Learn more.

  • Ensuring Rock-Solid Unified Endpoint Management

    Endpoint management has become an increasingly complex task for IT with the proliferation of BYOD endpoints. Increasingly employees use iPhones and iPads, Android-based phones and tablets, Google Chromebooks and other devices to access and change company data. Learn more.

  • The Definitive Guide to Backup for Office 365

    Now that you’ve found the perfect productivity solution in the cloud, it’s time to get to know your options for keeping your data in Office 365 safe from loss. You may be surprised to discover that there are various options available to protect your Office 365 data. In fact, you may be surprised to learn that there are any at all. Read on.

  • Windows 10 Servicing and the New Reality

    Read this paper where Greg Shields, Microsoft MVP, sat down with Steve Campbell, technical evangelist at 1E, to discuss how IT can cope with Microsoft’s new Windows 10 release cadence. Learn more.