Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • 7 Ways to Be Harder to Hack

    Call it layered security or defense in depth, but make sure that you use it. While the concept is as old as security thinking itself, that doesn’t make applying layers of security any less relevant. Learn more.

  • 5 Ways IT Pros Automate Business

    Learning how to streamline manual, repetitive tasks frees up technicians to work on the most valuable activities that support the business goals of their organizations. Learn more.

  • Security Brief - Security Challenges in the New Threat Landscape

    CounterTack’s Endpoint Threat Platform (ETP) empowers security teams with the behavioral and predictive intelligence they need, to adopt more agile and proactive threat management strategies, to protect sensitive data, and ensure uninterrupted business operations. Learn more.

  • What to Look For In Endpoint Detection & Response Tools and Services

    CounterTack’s Endpoint Threat Platform (ETP) empowers security teams with the behavioral and predictive intelligence they need, to adopt more agile and proactive threat management strategies, to protect sensitive data, and ensure uninterrupted business operations. Learn more.

  • Containing Targeted Cyber Attacks: Best Practices for Gaining Control over the Enterprise Endpoint Environment

    CounterTack’s Endpoint Threat Platform (ETP) empowers security teams with the behavioral and predictive intelligence they need, to adopt more agile and proactive threat management strategies, to protect sensitive data, and ensure uninterrupted business operations. Learn more.

  • Ovum Report: The Clear Leader: Veeam

    Ovum has recognized Veeam as THE CLEAR LEADER in the new Ovum Decision Matrix: Selecting a Data Availability and Protection Solution for the Cloud Era, 2016 - 17, delivering the highest Execution & Technology assessment score compared to the competition. Read full report.

  • NetApp + Veeam: Customer Reference Book

    According to the 2017 Veeam Availability Report, the vast majority of organizations experience unplanned downtime that costs the average enterprise up to $21.8M per year. In addition to lost revenue and productivity, downtime can cause a loss of customer and employee confidence and damage to your brand identity. It doesn’t have to be that way - NetApp and Veeam® can help. Get the paper.

  • Advanced Data Protection Using Veeam and NetApp Technology

    Learn how organizations can attain RTPOs of <15 minutes for all applications and data while improving business speed when NetApp storage is combined with Veeam. Register now.

  • New 2017 Availability Report

    Veeam® commissioned ESG to survey over 1,000 global IT decision makers to better understand the protection, recovery, and Availability challenges they are facing today. Overall results were surprising! Learn more.

  • Best Practices for Evaluating Disaster Recovery Solutions

    Businesses today are more aware of the risks of a weak disaster recovery solution. This white paper lists best practices for evaluating DR solutions to ensure IT resilience. Read on.

  • The Phishing Breakthrough Point

    Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots. Learn more.

  • Your Money or Your Life Files! A Short History of Ransomware

    This white paper provides a history of ransomware and what you can do to prevent being attacked. Learn more.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Phishing and malware threats are skyrocketing as cybercriminals become more adept, stealthier and more able to penetrate your IT security defenses. The consequences of even a single attack penetrating your network can be devastating, resulting in enormous potential losses. Learn more.

  • Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

    For the second year in a row, leading IT analyst firm Enterprise Management Associates (EMA), has delved into the world of security awareness and policy training. Their latest research on this topic revealed that a tremendous shift in awareness training programs has taken place, especially in small and medium businesses. Learn more.

  • Get Your Ransomware Hostage Rescue Manual

    Being in IT I’m sure you know someone who’s been hit with ransomware or you have been through it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent it in the future? Now you do! Learn more.

  • 9 Ways to Stay Undefeated Against Disasters

    At $9,000 a minute, downtime is expensive and IT managers need to do everything they can to increase uptime. Even just a 1% increase in uptime can save your company millions in negative business impacts. Learn the 9 steps you can take to protect against downtime. Read on.

  • 5 Security and Efficiency Tools Every Hybrid Office 365 Enterprise Must Have

    Microsoft’s move to the cloud has left enterprises searching for Tools to streamline Office 365 or Hybrid Administration. This interactive Whitepaper will describe and demonstrate 5 Must have Tools for any Office 365 Enterprise customer. Read on.

  • Tackling Office 365 Deployment

    Read this Digital Dialogue to find out how to make Office 365 adoption a win-win for both IT and end users, including configuring email and other apps so they work more like the on-premises Office. Read on.

  • For Dummies Guide: Securing Privileged Access in Active Directory

    The eBook helps organizations and administrators focus on the key aspects of securing privileged accounts. Merely securing privileged accounts goes only so far because changes can be made to secured accounts nearly within seconds, making them insecure again. So, securing privileged accounts is only one part of your responsibility; you must also monitor changes to those accounts. Read on.

  • That Insecure Feeling About Office 365 Email Security and Resilience

    Mimecast research finds that over 9 in 10 companies adopting Office 365 will use some kind of third party solution to augment built in capabilities. Learn the keys to realizing the benefits of Office 365. Learn more.