Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • 6 Steps SIEM Success

    Whether you are looking at SIEM for threat management or compliance, we’ve put together the following evaluation guide to help you find the best SIEM solution for your organization.

  • Beginner’s Guide to Open Source Intrusion Detection Tools

    Discover the Various Open Source IDS Tools Available to You. This white paper provides an overview of Open Source IDS and the various IDS tools available today. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, these are some of the best open source intrusion detection (IDS) tools available to you.

  • Beginner’s Guide to AWS Security Monitoring

    As organizations around the world shift their workloads to Amazon Web Services (AWS) and other popular cloud infrastructure-as-a-service (IaaS) providers, concerns about cloud security continue to rise. According to a 2018 Cloud Security Report from Cybersecurity Insiders, 91% of respondents are concerned about cloud security, an increase of 11% over last year’s report. This report will examine a number of these concerns in detail, and specifically address how to avoid making costly mistakes that can leave data exposed.

  • Insider’s Guide to Incident response

    The Insider’s Guide to Incident Response gives you an in-depth look at the fundamental strategies of efficient and effective incident response for security teams that need to do more with less in today’s rapidly changing threat landscape.

  • Beginners Guide to SIEM

    Need a crash course on SIEM? No problem. Security Information and Event Management (SIEM) platforms provide real-time correlation of events generated from network security controls. Our security gurus will explain what SIEM is (and isn’t) and how to get up and running with it quickly and painlessly.

  • How to Build a Security Operations Center (on a Budget)

    In this eBook you'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.

  • Best Practices for Integrating Applications Development

    Integration of enterprise applications for better data consistency and process automation continues to be a challenge for software development and IT teams. This paper discusses the best practices for implementing an effective application integration solution. Learn more.

  • Open Source Network Security Tools for Beginners

    In this white paper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.

  • eGuide: Unlock Hidden Resources in Your Hybrid Virtualization Infrastructure

    As the virtual hybrid infrastructure has evolved, technologies and tactics for backup and recovery have evolved as well. Backup and recovery functions have changed significantly with the advent of virtualization and cloud-based environments. Read this paper to learn about technology that can help you expedite the recovery process.

  • The Case for Embedded Analytics

    Considering embedded analytics? Research suggests that putting analytics in the context of your business applications and workflows is more effective than using standalone applications. Learn about the top 4 key reasons for embedding your analytics. Download The Case for Embedded Analytics infographic today!

  • What is the Analytics OS

    In the current data environment, organizations can no longer rely on legacy or self-service analytics and BI applications. They need to bring all their disparate assets--regardless of source or type--together on a single platform. Can an Analytics OS help? Download the What is the Analytics OS white paper to see if Pyramid's balanced approach to analytics may work for your organization.

  • Unlocking Analytic Insights

    Visualizations have become the predominant method for understanding complex data. But what if we've become overreliant on visualizations at the expense of data integrity? In this Unlocking Analytic Insights white paper, we show four ways to go beyond visualizations with a complete analytics solution.

  • Gartner Report: Fighting Phishing – 2020 Foresight

    90% of cyber threats start with email, making it the #1 threat vector. Phishing attacks paired with impersonation techniques have made these email threats more sophisticated and harder to detect.

  • Email Security: A Buyers Guide

    Email is the main way that cyber criminals target victims for advanced cyber attacks such as ransomware and credential stealing. And attackers break into organizations even when the targets have email security products installed. You’ll learn how to evaluate and purchase effective email security solutions for advanced threat protection.

  • FireEye Helix Datasheet

    FireEye Helix is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. Available with any FireEye solution, FireEye Helix integrates your security tools and augments them with next-generation SIEM, orchestration and threat intelligence capabilities to capture the untapped potential of security investments. Designed by security experts, for security experts, it empowers security teams to efficiently conduct primary functions, such as alert management, search, analysis, investigations and reporting.

  • The State of Cloud (in)Security

    FireEye is in a unique position to see global cybersecurity threats, threat actors and their impact on breached organizations. Grady Summers, FireEye’s CTO, discusses how organizations can use staff and intelligence to bolster their cloud security defenses in 2019.

  • Top 5 Cloud Security Myths Debunked

    The cloud brings great promise of allowing organizations to do more with less, democratizing resources so that startups can enjoy the same capabilities as juggernauts of industry, and allowing apps to grow to a scale not seen before. But this means that cloud resources require dedicated, specialized attention to ensure they are not being misused and that their data stays secure. Organizations must keep up with security tools and training they need to ensure that they are ready for the big shift.

  • Taking Control of Security Operations

    This white paper examines the essential capabilities of a security platform and offer some points to consider when selecting a security vendor.

  • The Forrester New Wave™: External Threat Intelligence Services

    Threat intelligence is one of the most overused terms in cyber security today. Every vendor promises their threat intelligence will solve your security challenges. This creates confusion in the marketplace and makes it challenging to evaluate threat intelligence offerings. To help organizations better understand threat intelligence service offerings, Forrester recently published their research report: The Forrester New Wave™: External Threat Intelligence Services, Q3 2018.

  • The Cost of No Context: The Value of True Cyber Threat Intelligence

    The security sector is littered with providers claiming to offer “cyber threat intelligence”. But not all intel is created equal! Learn to differentiate true threat intelligence from traditional data feeds that lack the context to improve security.