Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Digital Asset Management: Enabling Visual Storytelling

    Read this eBook to find out how end-to-end digital asset management (DAM) solutions can help you make the most of digital assets such as images, infographics, audio files and videos. Learn more!

  • BlueVoyant Managed Security Services

    Learn how BlueVoyant’s elite security professionals provide the intelligence needed to take industry-leading tools and make them robust, relevant and right-sized for your organization.

  • Emotet Malware Case Study – Municipal Government

    A municipality came under an attack that gave the cyber attacker access to over 1,400 end points. Learn how BlueVoyant identified and remediated the attack.

  • TrickBot and Gozi Malware Case Study – Online Payment Card Processing

    A company contacted BlueVoyant to assist with a chargeback fraud incident. This case study details how BlueVoyant ‘s experts responded, identified the malware, and remediated the attack.

  • Top reasons why Office 365 migrations often fail

    Migrating to Microsoft Office 365 can be complicated. Even with careful planning, deploying Office 365 and delivering a fast user and application experience can be a challenge. In this document, we’ll tackle the reasons for common migration problems and, to help you get on the road to success, we’ll offer tips for avoiding or overcoming these challenges.

  • The survivor’s guide to building an Office 365 network

    Office 365 can be one of the most demanding SaaS applications your network has ever seen. Whether you're just starting to implement Office 365, or your installation hasn’t been going as planned, there are a few key network concepts that can make all the difference in your deployment success.

  • Get an Office 365 Experience Your Users Will Love

    To measure the success of your Office 365 deployment, there’s really only one metric that matters: user satisfaction. With multiple apps and services, including latency-sensitive applications like Skype, it’s critical to optimize your network for the fastest Office 365 experience.

  • The Best Route for Office 365 Migration

    Read this paper to find out what you need to do to plan, execute and secure the Office 365 migration for your current on-premises applications and data.

  • Minimize Active Directory Dependency as You Move to the Cloud

    Microsoft's Active Directory (AD) has been a cornerstone for authentication in enterprise-grade systems for years—responsible for features such as SSO and storing sensitive login data. As organizations shift from legacy on-prem infrastructure to SaaS apps, they find AD hinders the speed, efficiency and results of their modernization initiatives.

  • The Eight Principles of Modern Infrastructure Access

    Infrastructure resources are some of the most sensitive and valuable assets across your network. Whether in the cloud or on-prem, controlling access to servers and databases is a top priority for IT and Security departments. While traditional methods are laser-focused on “protecting the keys”, admin credential breaches continue to slam organizations. Something has to change. It’s time for organizations of all sizes to have a better identity-led architecture—one that lets you design a highly secure, automated environment that can scale.

  • Closing the Security Gaps in Cloud Infrastructure Management

    A recent IDG survey unveiled a clear message on IT and security leaders’ challenges and strategies for managing server access: Cloud is changing where and how IT infrastructure is accessed and the traditional security methods aren’t keeping pace.

  • Cloud Identity Essentials - How Companies Benefit from Identity and Access Management (IAM)

    As enterprises rapidly transition to a hybrid IT environment, controlling access to applications in your enterprise is increasingly important—and complex. To confront the challenges of modern IT, it’s important to offer users a centralized identity for websites, systems, and cloud applications.

  • State of Ransomware and Its Drastic Impact on Business

    Read this paper to learn about new security survey results and what you can do to be prepared for the worst, including proactively backing up your data and updating software.

  • Detect Advanced Threats with Endpoint Detection and Response (EDR)

    As malicious actors target endpoints with new types of attacks designed to evade traditional antivirus tools, security teams are looking to endpoint detection and response (EDR) solutions for an additional layer of security. In this solution brief, you will learn how AlienVault’s approach to delivering advanced EDR capabilities enables you to automate threat hunting and detect evasive threats that traditional antivirus can’t. Learn more.

  • Security Information and Event Management (SIEM) Mid-Market Analysis

    This Executive Brief is based on the 2017 Frost & Sullivan report, “Security Information and Event Management (SIEM)—Global Market Analysis, Forecast to 2021” which provides an analysis of the SIEM market, examines the innovations driving that market and compares the positions of leading competitors. Learn more.

  • Beginners Guide to SIEM

    Need a crash course on SIEM? No problem. Security Information and Event Management (SIEM) platforms provide real-time correlation of events generated from network security controls. Our security gurus will explain what SIEM is (and isn’t) and how to get up and running with it quickly and painlessly. Learn more.

  • IDC Technology Spotlight: IDC Managed Inbox Detection and Response

    Download this new IDC Managed Inbox Detection and Response Technology Spotlight today and you’ll learn the latest approach to fighting targeted phishing attacks and other inbox threats with a next-generation email security platform that includes pre-delivery protection, post-delivery detection and incident response. Learn more.

  • Nine Best Practices to Reduce Active Directory Security Breaches and Insider Threats

    What can you do to defend your organization against the real and growing insider threat? This ebook can help.

  • Office 365 and Email Migration: Eight Lessons Learned

    If you’re considering an Office 365 or email migration and want to tap into some great advice from your peers who have already been there, read this collection of eight lessons learned.

  • A Beginner’s Guide to Microsoft Azure Reserved Virtual Machine Instances

    Microsoft Azure Reserved Virtual Machine (VM) Instances are an effective way to reduce your Azure spend. Reservations enable you to make an all upfront payment towards your compute costs, thereby providing prioritized capacity. Learn more.