Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • 2020 CIO Cloud Data Management Initiatives

    Read this new Frost & Sullivan executive brief and learn how to deliver Backup Modernization, Security & Compliance, Hybrid Cloud Acceleration.

  • Making an impact with Cloud Data Management

    As consumers and customers, we are accustomed to easy, intuitive, and superfast transactions driven by data. Therefore, businesses have the various challenges of managing and mining the data they produce and use, but also ensuring that their digital experience is 100% reliable for their customers — so the chain of trust is never broken.In this new eBook learn how companies like Volvo Car BeLux, Southampton Football Club, Hendrix Genetics and others tackle those challenges with Cloud Data Management.

  • Enhancing Data Protection in Microsoft Office 365

    Like other organizations around the globe, there’s a good chance you’re using Office 365 in your workplace. But are you doing enough to make sure the data within it is being properly protected?

  • Flexible data migration across clouds and hypervisors

    Your data environment is much more diverse, which means your strategies for managing data migration, backup & recovery, and disaster recovery need to be more flexible than ever. This is where we can help.

  • The Critical Role of Email Risk Scoring in Fraud Prevention

    Every time an email address is used, it leaves a trace. Over time, those traces unveil patterns of behavior. This story can be examined to assess the risk present in every transaction and help fraud teams confidently approve more transactions, reduce customer friction and boost your bottom line.

  • Backup for Microsoft O365. Know your part.

    Microsoft provides a wide array of powerful services within Office 365 that can help your employees connect and collaborate. Unfortunately, a comprehensive backup of your Office 365 data is not one of them. Veeam Backup for Microsoft Office 365 can help! By eliminating the risk of losing access and control over your Office 365 data, you can rest easier knowing your valuable data is secure and always accessible—exactly when and where you need it.

  • Basic Principles of KCS

    KCS, or Knowledge-Centered Service, is a methodology that allows organizations to create a single source of truth. In the contact center, using KCS translates to increased efficiencies and productivity, for improved customer and employee satisfaction.

  • Customer Service Playbook

    Delivering exceptional customer service is no easy task. Use this playbook as your guide when navigating through 5 of the biggest challenges that customer service teams face.

  • Deploying Microsoft Teams with Phone Systems

    Evolve IP’s User Guide to Microsoft Teams Direct Routing for businesses considering integrating Microsoft Teams with voice services. This overview dives into the major considerations you’ll want to think through, as well provides advice on implementing Microsoft Teams Direct Routing independently or with a 3rd party enterprise voice provider like Evolve IP.

  • Microsoft automates to achieve more with Red Hat Ansible Automation Platform

    See how Microsoft worked with strategic partner Red Hat to build a collaborative, efficient approach to IT automation with DevOps and Ansible.

  • The Rising Risk of API Security in Your Organization

    Recent data breaches reported by major enterprises have made it clear that APIs are an increasingly-popular attack vector for hackers. This rising trend has a lot to do with how APIs traditionally grow and evolve within companies. View this infographic to understand the lifecycle of an API and what to do next.

  • API Security from Concepts to Components

    This whitepaper describes the modern API Security landscape, and how to effectively leverage OAuth 2.0 and API Gateways for authentication and authorization from both the infrastructure and software development mindset.

  • Are Your Internet Assets Behaving?

    In a time where networks evolve each day and include a diverse collection of Internet Assets such as IP addresses, domains, and certificates - how do you ensure that none of your Internet Asserts communicating in a way that puts your enterprise at risk?

  • 5 Common Perimeter Exposures

    Download this white paper to learn the five most common exposures and proactive steps you can take to protect your network.

  • How to Defend Your Attack Surface

    Given the limited number of resources available to every security staff, it’s essential to focus on the biggest risk factors when securing your organization. The data show that for many organizations, lack of basic perimeter security and hygiene causes the largest number of data breaches and the biggest impact on the bottom line.

  • Expanse Solution for Cloud Governance

    Cloud adoption has been a hallmark for companies embarked on digital transformation. Leaders have always wanted to empower their employees with their own tools and to remove bottlenecks in IT processes to engender greater productivity. Cloud adoption has done this in spades by decentralizing purchasing and provisioning of IT resources with flexible a pay-as-you-go service model. But empowerment can lead to loss of control, increasing risk of overspending and cyberattacks.

  • Expanse Internet Operations Management

    One of the biggest challenges organizations face is an incomplete and inaccurate understanding of which Internet Assets they own or are attributed to them. Current tools and processes fail to achieve accurate, continuous discovery across the organization’s attack surface, leaving significant visibility gaps. These visibility gaps lead to risks and exposures that can hurt an organization at an unrecoverable scale.

  • Blog - Think Cloud Visibility Is a Problem? You’re Not Alone

    The cloud is here to stay. But for many organizations, the challenge of managing their cloud assets and associated cloud risk still feels like a moving target.

  • Redmond Intelligence: Satya Nadella Technology Progress Report

    To many on the outside, Satya Nadella’s leadership of Microsoft still seems fresh, but he’s now spent a half a dozen years in the role. At the macro level, Nadella has moved mountains, taking a company that seemed doomed when he took over and not just reviving it, but returning it to a leadership position. Microsoft once again needs to accelerate the rate of change. Nadella needs another big push, comparable in magnitude and impact to the one he launched at the beginning of his reign. If Nadella can force more change, push Azure to compete even better with AWS and clean up the AI sprawl, he’ll be able to kick off the new decade as nicely as he did in the last decade.

  • AWS Backup for Dummies

    So it turns out that data doesn’t protect itself. And despite providing what might be the most secure and reliable compute platform the Universe has ever seen, Amazon Web Services (AWS) can’t guarantee that you’ll never lose data either. To understand why that is, you’ll need to face your worst nightmares while visualizing all the horrifying things that can go wrong, and then boldly adopt some best practice solutions as you map out a plan to protect yourself.