Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Save costs and achieve more with Red Hat OpenShift managed services

    Integrating Kubernetes into complex IT environments yourself can be difficult and time consuming. Red Hat works with key cloud provider partners to deliver fully managed container environment services that simplify deployment and operations. Four Red Hat® OpenShift® managed services are available, so you can choose the option that best fits your organization’s needs. Each service allows you to take advantage of flexible pricing models, reduce your support costs, increase operational efficiency, and free your staff to innovate. Read this brief to see how you can save costs and achieve more with Red Hat OpenShift managed services.

  • Simplify Kubernetes adoption

    Learn more about Red Hat OpenShift Service on AWS and how it brings together container platforms, cloud infrastructure, and support and operations for optimal results.

  • Boost database performance and agility

    Boost database performance, reduce costs, and prepare for future change with this hybrid cloud foundation for Microsoft SQL Server Workloads.

  • BlueVoyant’s Modern SOC Executive Summary eBook

    Operationalize Your Microsoft 365 Security Capabilities and Stay Secure. Download the eBook today to understand the full scale and capabilities of the BlueVoyant Modern SOC. Company exposure today can appear in many different sizes and forms, resulting in a breach that can cost your organization millions of dollars. With BlueVoyant’s Modern SOC, you can stay secure by operationalizing the fully integrated Microsoft 365 security capabilities while utilizing our complete portfolio of security focussed services designed to come to you.

  • Uniting Managed Detection and Response (MDR) with Microsoft® Azure Sentinel and Microsoft® Defender XDR

    While other MSSP require data to be sent to their infrastructure and data centers for analysis, BlueVoyant’s service allows you to keep your data in your own environment, reducing cost, and ensuring stronger compliance. BlueVoyant’s Modern SOC provides a complete portfolio of Microsoft security-focused services, including a customized deployment of Microsoft security tools, ongoing platform care and maintenance, and 24/7 security operations as a service.

  • 7 Experts on Implementing Azure Sentinel

    One big challenge for many security teams is consolidating and analyzing the data generated in a networked environment. Organizations attempt to address this challenge by using a security information and event management (SIEM) system to collect that data for analysis. In addition to being a best-in-class SIEM system, Azure Sentinel is a platform for security orchestration, automation, and response capable of automating playbooks; monitoring both Windows and Linux environments; and monitoring Amazon, Google, and Azure clouds—and that’s just for starters. Find out what advice our seven security experts give on transitioning to and optimizing the Azure Sentinel solution.

  • 7 Experts on Adopting Microsoft 365 Defender

    Microsoft has invested heavily in its security offerings so that they now provide among the best protection available today. Microsoft 365 Defender is a suite of integrated tools for protecting endpoints, Office 365 applications, identities, and cloud applications. People with existing Microsoft E5 licenses may not even know that all these tools are already available to them as part of their license. Find out what advice our seven security experts give on transitioning to and optimizing the Microsoft 365 Defender suite of tools.

  • The State of Password Security in the Enterprise

    A recent authentication security strategy survey by Enzoic and Redmond magazine revealed insights into the way that passwords are currently being used in various organizations, and what the future looks like regarding this ubiquitous authentication method.

  • 4 Azure Considerations to Reduce Costs

    In this guide, we discuss four key considerations to controlling costs with Azure, while getting the best of all the available offerings and features. Whether you’re newly adopting cloud or already have had a cloud-first approach for some time, learn why these 4 considerations will ensure success in utilizing Azure.

  • Conversational Geek: Azure Backup Best Practices

    This book focuses on what's truly important - getting back to the basics of backup and using best practices to ensure the backup and data protection strategies you implement are truly effective.

  • Top 5 Ways to Simplify Data Protection with Microsoft Azure

    Read this white paper to find out five ways that you can simplify data protection with Microsoft Azure.

  • Office 365 Backup For Dummies

    Get this easy-to-read e-book For Dummies, and learn how to best backup and protect your Office 365 data. It’s you data, it’s your responsibility to protect it!

  • Microsoft Teams Backup - a Conversational Geek E-book

    Learn everything you need to know about protecting Teams data from this Conversational Geek e-book by Brien Posey, Microsoft MVP.

  • Why a Backup Strategy for Office 365 is Essential

    This short, easy-to-read research paper by IDC provides their view on why having a backup of Office 365 data is essential.

  • 7 Critical Reasons for Office 365 Backup

    You have one more reason added to the 6 critical reasons to protect your Office 365 data. This 5-minute read document helps you convince your managers and peers that your organization needs Office 365 data protection.

  • The Ultimate Teams Performance Guide

    Get your guide today and take the immediate steps to optimize the Microsoft Teams experience.

  • Essential Guide to Securing Microsoft Active Directory

    Securing Microsoft Active Directory (AD) involves dealing with a mixed bag of risks, ranging from management mistakes to unpatched vulnerabilities. AD has become a prime target for cyber-attackers who use AD to elevate privileges and gain persistence in the organization. Investigate a typical data breach, and you’ll find that stolen credentials likely were used—sometimes for initial entry, sometimes for accessing critical systems, but always to the detriment of the targeted organization.

  • 7 Experts on Implementing Microsoft Defender for Endpoint

    As with other security tools in the Microsoft 365 Defender suite, deploying Microsoft Defender for Endpoint is easy. With the right licensing, you can turn the tool on with just a few clicks. Turning it on and maximizing its effectiveness, however, are two completely different things. Find out what advice our seven security experts give on transitioning to and optimizing Microsoft Defender for Endpoint.

  • 2021 Data Protection Trends

    2020 was a unique year that forever changed the IT landscape, creating new challenges for all. In the new Veeam report, more than 3,000 business and IT leaders across 28 countries were surveyed on their data management challenges and successes, including the impact 2020 had on IT. Download the 2021 Data Protection Trends report to learn about today’s data protection impact, costs and benefits with key insights from industry experts.

  • Recon Research - Evaluation of BlueJeans Gateway for Microsoft Teams

    Recon Research provides a step-by-step evaluation of BlueJeans Gateway for Microsoft Teams through a hands-on testing of a SIP/H/323 Cloud Video Interop solution.