Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • The Business Email Compromise (BEC) Handbook

    A Six-Step Plan for Stopping Payment Redirection, Supplier Invoicing Fraud and Gift Card Scams. Sometimes, that email from your boss isn't really an email from your boss. Business email compromise (BEC) has become the costliest form of cyber crime, tricking victims out of more than $1.8 billion in 2020 alone. These highly targeted cybersecurity threats are easy to fall for and invisible to traditional security tools. Learn how to manage them with our comprehensive guide and six-step plan.

  • Breaking Down BEC - The Modern CISO’s Framework for Identifying, Classifying and Stopping Email Fraud

    Break the attack chain. Learn how to stop costly BEC attacks. Business email compromise (BEC) attacks can be costly and difficult to prevent. Traditional email security solutions may not be enough to fight off the latest BEC attacks that are getting through your current security solutions.

  • 7 Critical Reasons for Microsoft 365 Backup

    This report explores the hazards of not having a Microsoft 365 backup in your arsenal, and why backup solutions for Microsoft 365 fill the gap of long-term retention and data protection.

  • Maverick* Research: You Will Be Hacked, So Embrace the Breach

    Cybersecurity breaches are inevitable. Instead of striving to prevent breaches, focus on resilience and embrace hacks as incidents to learn from.

  • Strategic Framework for Ransomware Resilience

    In 2022 only 16% of organizations who suffered a ransomware attack were able to recover without paying a ransom. Since it’s not possible to prevent every cyberattack, organizations need to make recovery a priority. This paper outlines the critical capabilities needed to prepare for and recover from a ransomware attack, reducing downtime and minimizing the possibility of data loss.

  • The Total Economic Impact of Quest Recovery Manager for Active Directory Disaster Recovery Edition

    Ransomware attacks have increased threefold since 2020, and companies that struggle the most during an outage are specifically targeted. IT decision-makers are under increasing pressure to prepare a speedy recovery plan for Active Directory in particular, as it has become one of the biggest targets during an attack. Forrester found that organizations using Quest’s RMAD DRE recovered their Active Directory up to 98% faster in the event of a ransomware attack, translating to millions of dollars saved.

  • Lessons Learned from a Recent Ransomware Recovery

    Read this white paper to learn about a ransomware attack on a global manufacturing company. Even though 17 Active Directory domain controllers across multiple continents were impacted and the passwords for virtually all user accounts were scrambled, the IT team was able to get the organization back on its feet quickly. Here are the key takeaways you can use to strengthen your ransomware and Active Directory disaster recovery strategies.

  • Be Prepared for Ransomware Attacks with Active Directory Disaster Recovery Planning

    Download this white paper to discover how to design an enterprise-quality Active Directory backup and disaster recovery strategy for getting your critical business operations back online quickly, and a proven solution for implementing it.

  • The Microsoft 365 kill chain and attack path management

    This white paper debunks the key misperceptions about modern cyberattacks and lays out the true phases of a cyberattack, reviewing some of the most common tactics and techniques used in each phase with a particular focus on the Microsoft 365 environment. Then it dives deep into one strategy that adversaries use to achieve their goals — exploiting attack paths — and provides effective options for defending your organization.

  • How Active Directory Recovery Strengthens Cyber Resilience

    For organizations that rely on Microsoft to manage their data and communications, Active Directory (AD) serves as a doorway to their digital functions and services. It’s the primary mechanism for authenticating users and enabling access to databases, files, applications, computers and other endpoints.

  • A Practical Approach to Cyber Resiliency

    Read this white paper to discover how attack path management works and how you can quickly implement it. You’ll also learn how to complement attack path management with other key strategies to achieve not just cyber security, but cyber resiliency.

  • Government Agency Enhances Cybersecurity

    At one state Department of Transportation, the Great Retirement in the wake of the pandemic meant the loss of a number of experienced IT pros. The complexity of their long-established Activity Directory made one fact abundantly clear: The IT team didn’t know what they didn’t know — and those unknowns were putting security, business continuity and compliance at risk.

  • Microsoft Active Directory Backup and Recovery - Five Times Faster!

    ESG validated how Quest Recovery Manager for Active Directory Disaster Recovery Edition (RMADDRE) simplifies, accelerates, and automates backup and recovery of Microsoft Active directory. The solution achieved higher levels of performance thanks to automation. It also provided flexibility and reduced the risk of reintroducing malware.

  • Ultimate Cyber-Resiliency: a guide to combatting AD security villains

    Defend your hybrid Active Directory from risks, threats and disaster.

  • Don't let the retirement crisis become a security crisis

    Strategies for keeping your Active Directory secure, even as the Baby Boomers who manage it retire in droves.

  • 7 reasons you need a third-party telephony integration for Microsoft Teams

    Microsoft Teams is great, but you can make it even better. This Ebook covers seven critical reasons to integrate Microsoft Teams with a third-party cloud telephony solution.

  • Closing Security Gaps for Connected Devices in Healthcare

    Medical devices have become critical to patient care—and are connected to each other, your network, the internet, and the cloud. But many have inherent vulnerabilities, creating gaps in overall security. This ebook breaks down these risks and shows how an automated Zero Trust approach to medical device security can close the gaps.

  • The Right Approach to Zero Trust for Medical IoT Devices

    The Right Approach to Zero Trust for Medical IoT Devices explains the fundamentals of Zero Trust and how to achieve it for connected medical devices. You will get a review of the three main principles of a Zero Trust approach to device security.

  • Medical IoT Security RFI Checklist

    The purpose of this vendor-agnostic Request for Information (RFI) is to help our customers evaluate IoT security solutions that allow them to effectively address network security for unmanaged endpoints within a network.

  • 2023 Gartner Market Guide for Medical Device Security Solutions

    The 2023 Gartner® Market Guide for Medical Device Security Solutions is a must-read for CISOs facing cyber risks in securing connected medical devices. Use this guide to level up your healthcare organization’s medical device security strategy and software procurement process.