Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Beat Ransomware in 5 Easy Steps

    The threat from ransomware continues to grow and has become so prolific that it is no longer a question of “if” you are going to get hit, but when. A solid backup vendor and process is the only protection from an attack, but not all backup vendors completely solve the issue. Get a playbook of five steps organizations should use to protect themselves from the excessive downtime, data loss and business disruption of a ransomware attack. Learn more.

  • 5 Cornerstones to Devising Your Backup & Continuity Defense

    Businesses are producing exponentially more data and using more technology than ever before and it all needs to be backed up and stored. While IT manages the explosive growth on the digital front, there’s pressure on departments to stabilize or even cut spending. Learn how to protect your business at a time when your data is growing 33 times faster than your IT staff. Learn more.

  • The State of Cloud Backup & Data Protections

    Data protection and recovery remains a significant challenge. Data centers are growing in complexity and the volumes of data requiring protection are adding to the pressure on IT teams to guarantee quicker recoveries. See where your business stands against the very latest IT metrics from the Unitrends annual cloud survey including recovery times, DR testing frequency, and cloud usage. Read on.

  • 10 Ways to Use Artificial Intelligence for Simpler, Smarter IT

    New intelligent systems are making our lives simpler and more productive. AI advancements are already being integrated in solutions responsible for backup and data protection. Learn 10 ways you can use AI to your advantage when it comes to backup and recovery. Read on.

  • The Definitive Guide to Backup for Salesforce

    Because Salesforce is integral to keeping customers happy and growing your business, it is critical to fully protect the data stored in this SaaS application with a third-party backup solution. Wait. What? Doesn’t Salesforce have data protection covered? Well, yes and no. Read on.

  • Three-Step Guide to Protecting Data in Office 365

    You’ve made the move to Office 365 to reap the benefits of the cloud. Now, to ensure business continuity and to meet compliance demands you need to protect your critical data from loss. Read on.

  • Three-Step Guide to Protecting Data in Salesforce

    Oh, the horror of losing vital Salesforce data! Whether an application sync overwrote good records, or an admin made a change that caused data loss, or anything between, you need to be able to act fast to get your data back. Read on.

  • Veeam Availability Platform Designs for Ransomware Resiliency Series

    In this new white paper, Veeam® Availability Platform designs for ransomware resiliency series, Veeam offers sound tips for adding ransomware resiliency so you can provide the best levels of Availability for critical applications and data. Learn more.

  • Availability in the Digital Age - Veeam Drives Customer Success

    Veeam® Availability solutions drive customer success, but don’t just take it from us! Get a closer look at customer feedback and results while navigating through today’s most important technology trends and challenges such as multi-cloud, modern storage, backup appliances, converged infrastructure and ransomware. Learn more.

  • Get Your Disaster Recovery as a Service (DRaaS) Basics

    Disaster Recovery as a Service revolutionizes DR planning and implementation, offering one go-to solution for rapid system data recovery and 24/7 Availability. Cost reduction, simplicity, visibility and the ability to externalize expertise are just a few of the competitive advantages DRaaS leverages for your Always-On Business™. Learn more.

  • ESG Brief: Availability for Today’s Multi-Cloud Enterprise

    Read this ESG brief to learn more about the current trend in multi-cloud adoption for large companies; the future of on-premises IT environments; and more.

  • What’s New in Active Directory

    While Active Directory (AD) has been around since Windows 2000 Server, Microsoft has continued to make adjustments and introduce features in newer Windows Server releases, especially in Windows Server 2012. What’s New in Active Directory 2016 covers different AD features and the requirements to enable them. Learn more.

  • 7 Reasons NOT to Renew CommVault

    Why do Commvault customers switch to Veeam? Because Commvault does not meet the 24.7.365 availability requirements businesses demand today, nor the ability to restore any IT service running in the hybrid cloud within seconds and minutes. Learn why you should switch to Veeam.

  • Business Disaster Recovery Strategies

    This paper will help you prepare for outages in your infrastructure by sharing disaster recovery (DR) strategies. Often, DR outages are not a complete outage, so being prepared with granularity in your DR strategies gives you flexibility. Learn more.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Phishing and malware threats are skyrocketing as cybercriminals become more adept, stealthier and more able to penetrate your IT security defenses. The consequences of even a single attack penetrating your network can be devastating, resulting in enormous potential losses. Learn more.

  • Your Money or Your Life Files! A Short History of Ransomware

    This white paper provides a history of ransomware and what you can do to prevent being attacked. Learn more.

  • Get Your Ransomware Hostage Rescue Manual

    Being in IT I’m sure you know someone who’s been hit with ransomware or you have been through it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent it in the future? Now you do! Learn more.

  • The Phishing Breakthrough Point

    Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots. Learn more.

  • Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

    For the second year in a row, leading IT analyst firm Enterprise Management Associates (EMA), has delved into the world of security awareness and policy training. Their latest research on this topic revealed that a tremendous shift in awareness training programs has taken place, especially in small and medium businesses. Learn more.

  • 7 Cloud Security Best Practices for Amazon Web Services

    If you’re getting ready to move your data to Amazon Web Services or already have, here are seven best practices for AWS we recommend getting the most out of your cloud security. Learn more!