Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • How to comply with ISO 27001:2022 Security Controls Using SIEM

    The latest update of the ISO 27001 cybersecurity framework was published on October 25, 2022. The ISO 27000 family of standards consists of best practices and controls organizations can use to implement an information security management system (ISMS) and the CIA (confidentiality, integrity, and availability) triad to protect their data. The latest version brings with it several noticeable changes, and is more consolidated and comprehensive than ever before. Worry not! Our e-book explores ISO 27001 extensively and discusses the latest changes to this standard along with the security technologies you can use to comply with it and ensure organizational cybersecurity.

  • Augmenting Microsoft 365 to Protect People and Defend Data

    In this paper sponsored by expert cybsecurity firm Proofpoint, you’ll learn how to take a “shift left” approach to Microsoft 365 security, stopping attacks at the point of initial compromise before they go any further. With the right security strategy, Microsoft 365 doesn’t need to be a liability. Learn more – read the paper today.

  • ESG Report: Analyzing the Economic Impact of Commvault® Cloud

    TechTarget’s Enterprise Strategy Group (ESG) analyzed the economic benefits of cyber resilience with Commvault Cloud and concluded the unified platform provides substantial value to IT and Security teams in terms.

  • Solution Brief: Change the Rules for SAP HANA Data Protection with Commvault® Cloud

    As enterprises increasingly adopt SAP HANA to speed business process transformation and modernize IT, they need peace of mind that their mission-critical data is protected against the threat of data loss or attack. Download the solution brief to learn how Commvault® Cloud delivers enterprise-grade data protection as a simple cloud-delivered solution.

  • Group Policy Under Attack

    This white paper analyzes exactly how Group Policy is being misused by adversaries, based on the research of IT security experts into real cyberattacks. Then it explores the specific factors that make Group Policy an attractive target. Finally, it reveals the key strategies organizations need to adopt to defend their Group Policy — and their business.

  • Digital Dialogue Revolutionize Your Security Risk Prioritization

    This Digital Dialogue of a recent Redmond webcast presented by Microsoft MVP Derek Melber, delves into the strategies for mitigating risk and reducing costs by streamlining security concerns encompassing vulnerabilities, misconfigurations, identity, software, devices, and patching into a comprehensive and unified view, organized on a per-asset basis. This holistic approach to security posture management empowers organizations to prioritize high-risk assets and issues, culminating in an overall reduction of risk exposure and substantial cost savings when compared to the utilization of multiple disjointed security solutions.

  • Here is your Blueprint to Cloud Transformation

    In today’s ever-evolving digital landscape, having an effective strategy for data protection is essential for any organization. With the rise of cloud computing, hybrid environments have become a common way of life for many businesses. As companies move their workloads across their environment, it is important to protect data no matter where it lives.

  • 5 Ways Commvault Is Changing the Game in Data Protection

    In this discussion guide, you will learn about five ways you can maintain operational excellence for optimal recovery readiness with Commvault.

  • Fighting Ransomware: Team Roles and Responsibilities

    From hyper-focused zero-day attacks to broad-sweeping supply chain breaches, bad actors share one common goal: stealing, damaging, and monetizing your data to their advantage. Read this ebook to learn how to improve cross-team alignment and collaboration in the fight against ransomware.

  • Multilayered Data Protection & Recovery from Cyberthreats

    In today’s rapidly evolving threat landscape, organizations need multilayered data protection to minimize the risk of breach and accelerate recovery efforts in the event an attack. Download this solution brief to learn how to develop a cyberthreat protection and recovery plan with built-in multilayered data protection.

  • Keep Ransomware at Bay with Data Isolation and Air Gapping

    When it comes to securing and defending your data, you must be vigilant and take a proactive, multilayered approach. Data protection solutions built with a secure-by-design architecture ensure your data is recovery-ready with fundamental techniques. Read our in-depth whitepaper to discover the architectural components and tools that are essential for a durable, resilient, and proven backup framework.

  • The Microsoft 365 kill chain and attack path management

    This white paper debunks the key misperceptions about modern cyberattacks and lays out the true phases of a cyberattack, reviewing some of the most common tactics and techniques used in each phase with a particular focus on the Microsoft 365 environment. Then it dives deep into one strategy that adversaries use to achieve their goals — exploiting attack paths — and provides effective options for defending your organization.

  • A Practical Approach to Cyber Resiliency

    Read this white paper to discover how attack path management works and how you can quickly implement it. You’ll also learn how to complement attack path management with other key strategies to achieve not just cyber security, but cyber resiliency.

  • Government Agency Enhances Cybersecurity

    At one state Department of Transportation, the Great Retirement in the wake of the pandemic meant the loss of a number of experienced IT pros. The complexity of their long-established Activity Directory made one fact abundantly clear: The IT team didn’t know what they didn’t know — and those unknowns were putting security, business continuity and compliance at risk.

  • 10 Ways to Cut Cloud Costs and Minimize your TCO

    Surprised by cloud costs? You’re not alone. Between hidden fees and unexpected data charges, cloud costs often come in much higher than the “sticker price” you expected to pay by the time things are all said and done.

  • Modern Data Protection that Evolves with You

    Rapidly modernizing your environment without the proper data protection solution can create silos that leave you with complexity and vulnerability to cyberattacks like ransomware. Download this infographic to learn more.

  • ESG Impact Study: Economic Value of Commvault on Azure

    TechTarget’s Enterprise Strategy Group (ESG) analyzed Commvault, and specifically, Metallic, Commvault’s SaaS (Software as a Service) offering on Microsoft Azure, along with Commvault’s data protection software portfolio, to understand the impact it can have on the ability to reach IT and business goals.

  • Proactive Data Protection from Tomorrow’s Cyberthreats

    In this whitepaper, we uncover the common data protection missteps in today’s cyber era and how proactive data protection keeps business data safe from an ever-changing threat landscape.

  • Aligning Ransomware Protection and Recovery Plans with Critical Capabilities

    A multi-layered security framework is important for data security because it helps to provide a number of defenses to cover data security gaps that may exist within your infrastructure. It is the best approach to protect and recover from ransomware attacks. Commvault has built these security capabilities into our data protection software and policies.

  • New Cyberthreats Require New Thinking: Reimagined Data Protection from Commvault

    In this solution brief, you will learn the how a multi-layered data protection intelligently secures data to rapidly uncover risk, minimize cyberthreats, continuously control data and its access, and drive more informed recovery outcomes, wherever data lives. Download this solution brief to learn how to improve your data security.