Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Network and Endpoint Security

    To achieve the most advanced network security while preventing security threats, combine network and endpoint security for enhanced visibility, protection, and enforcement. Learn more.

  • Top 10 Configuration Risks in AWS

    Amazon® Web Services makes it easy to build a whole new world of servers and services, ready for any workload or application you throw at it. When you flip the switch and make your AWS® deployments live, though, are you leaving your apps and data at risk? Learn more.

  • Reduce Costs and Complexity with Network Security Consolidation

    Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Learn more.

  • Guide to Securing Microsoft Office 365 for the Enterprise

    The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. While Microsoft’s security tools and capabilities are a great start, many enterprises moving to Office 365 are finding that they need greater protection across all their cloud applications. Learn more.

  • 2018 NSS Labs Advanced Endpoint Protection Report

    In this report by NSS labs, Palo Alto Networks Traps Endpoint Security receives a rating of "recommend" in the Advanced Enpoint Protection Test, which determines how effectively an AEP product protects against threat. Learn more.

  • 6 Critical Reasons for O365 Backup

    When it comes to Office365 data backup, Microsoft doesn’t have you fully covered! Understand the hazards of not having Office365 backup, and how new solutions fill the gap of long-term retention and protection. Read more!

  • How to Enhance the Resilience of Your O365 Deployment

    Read this paper to find out what you should know before moving to Office 365, including what you need to protect your data in cases of accidental deletions, cyberattacks, and legal holds. Read more!

  • Migrating to HTTPS Everywhere

    Read this guide, Migrating to HTTPS Everywhere, to learn how HTTPS Everywhere with deployment of SSL/TLS across your entire website can benefit your company in areas including security, usability and SEO. Learn more.

  • Why HTTPS Is Essential to the Future of Your Website

    Read this white paper to find out why HTTPS is essential to the future of your website because browsers have already begun giving preferential treatment to HTTPS. Learn more.

  • Is Your Site Trusted By Every Visitor on Every Page, Every Time?

    Take a look at this Infographic to find out how using the right certificates for your website and each webpage will assure users your website is trustworthy, secure and professional. Learn more.

  • Your Quick Reference Guide to HTTPS Everywhere

    Download this Quick Reference Guide to HTTPS Everywhere produced by DigiCert, a leading provider of SSL certificates, to learn what you can do to provide authentication of the website’s identity, connection, and data integrity. Learn more.

  • One-Minute Whitepaper: Benefits of Migrating from ADFS to Okta

    Organizations of all sizes are on a journey to the cloud, migrating their legacy software and adopting new cloud-based apps. Find out how you can keep Active Directory while making federated identity easier to install, simpler to manage, less costly, and faster to deploy. Read on.

  • One-Minute Whitepaper: Top 8 Identity & Access Management Challenges with Your Saas Application

    We all know that the cloud is here to stay. Organizations are choosing SaaS apps at a greater scale than ever before, but this means IT teams are facing a new mix of challenges. We took a closer look at the most common pain points; these are the eight themes we found. Learn more!

  • PowerShell eBook Series: Parts 1-3

    We hope you enjoy this very resourceful ebook series on PowerShell. You’ll learn how to get started with PowerShell, the first steps within the console and how to create conditions along with many other topics. Learn more.

  • The End of The Trusted Network

    Read this Fireside Chat featuring Forrester Research director Stephanie Balaouras to find out what you can do to secure with a Zero Trust approach that improves network visibility, breach detection, and vulnerability management.

  • 6 Critical Reasons for Office 365 Backup

    Read this white paper to learn why it is important for you to take charge of Office 365 data backup in cases of accidental deletion, internal and external security threats, and legal and compliance requirements. Learn more.

  • Tackling Office 365 Deployment Challenges

    Read this Digital Dialogue to find out how you can use Ivanti technologies to make sure your migration to Office 365 is successful by having the right technologies to avoid any problems that impact users. Learn more.

  • DRaaS for Dummies

    Read DRaaS For Dummies to learn about a new easy-to-use approach to DR. After reading this book, you’ll have the foundation for deploying a solution to protect your business from disaster. Learn more.

  • Data Growth: Data Recovery's Worst Nightmare

    Read this paper to find out what IT departments can do to handle the explosion of data by decreasing storage with data deduplication provided by both your backup solution and storage hardware. Learn more.

  • Container Security - 10 Things DevOps Need to Do

    The growth of containers has led to a revolution in the way organizations develop and deploy applications. Download this eBook that reviews the 10 key things DevOps should know about securing containerized applications. Learn more.