Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Microsoft 365 Recovery Best Practices

    Recoverability isn’t a given with Microsoft 365. The fact that organizations need to back up their Microsoft 365 deployments has been well established. As important as backups might be, however, there is one critical item that always seems to get left out of the conversation. That item is recoverability.

  • Simplify your Microsoft Security Operations for Identity-Based Alerts

    How to detect and response to identity-based alerts in a Microsoft environment with an approach that stops breaches faster while still producing cost and time savings.

  • A Guide to MDR and Microsoft Security

    A guide to Managed Detection and Response (MDR) services for Microsoft Security tools. Learn how to maximize protection and performance for the Microsoft 365 Defender suite, Microsoft Sentinel and Microsoft Defender for Endpoint with MDR.

  • What Your Password Policy Should Be

    Reports of the death of passwords have been greatly exaggerated. In this e-book, Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist, details the pros and cons of password use. Roger explains how the implementation of supporting frameworks, such as MFA and password managers, can help you keep your organization locked down.

  • The Security Culture Report 2022

    The 2022 KnowBe4 Security Culture Report is the largest study of its kind, measuring organizations' security cultures and surveying more than 530,000 employees across 2,910 organizations worldwide. The report offers unique insights which allow organizational leaders to better understand how employees view security within their organizations. This information is also leveraged by business leaders to ensure necessary investment dollars are allocated to the most critical part of the security infrastructure: the human layer.

  • Achieve more for less with Microsoft Azure Red Hat OpenShift

    Microsoft Azure Red Hat® OpenShift® gives you a complete containerized environment based on production-grade components. This managed solution can help you reduce costs, increase operational efficiency, and free your staff to innovate. Read this brief to see how you can do more for less with Azure Red Hat OpenShift.

  • 9 reasons to trust Red Hat OpenShift and Microsoft Azure

    With a jointly engineered and supported solution, Red Hat and Microsoft accelerate time to value and create a unified approach to development.

  • The Total Economic Impact of Red Hat OpenShift cloud services

    The purpose of this report is to provide a framework to evaluate the potential financial impact of Red Hat OpenShift cloud services on organizations.

  • Getting started with Azure Red Hat OpenShift

    Bolster application building and deployment capabilities by using Azure and Red Hat OpenShift for full-service deployment of fully managed OpenShift clusters.

  • Provision BIG-IP on Microsoft Azure Red Hat OpenShift

    BIG-IP virtual editions (VE) for Microsoft Azure integrated with Microsoft Azure Red Hat® OpenShift® lets you take advantage of the elasticity of the public cloud while continuing to manage and better secure critical applications as you would when they’re hosted on-premise. Whether you want to move your applications entirely to Azure cloud, use a hybrid private-public cloud network, or deploy a multicloud architecture, BIG-IP VEs for Microsoft Azure can help optimize performance.

  • Save costs and achieve more with Red Hat OpenShift managed services

    Integrating Kubernetes into complex IT environments yourself can be difficult and time consuming. Red Hat works with key cloud provider partners to deliver fully managed container environment services that simplify deployment and operations. Four Red Hat® OpenShift® managed services are available, so you can choose the option that best fits your organization’s needs. Each service allows you to take advantage of flexible pricing models, reduce your support costs, increase operational efficiency, and free your staff to innovate. Read this brief to see how you can save costs and achieve more with Red Hat OpenShift managed services.

  • An Industry at Risk - Protect Your Life Sciences Company with a Digital Intelligence Strategy

    Download our whitepaper to learn how to protect your life sciences organization against emerging risks and empower your team with tools for proactive investigations and swift responses to threats.

  • Windows 10 IoT Enterprise

    An IoT OS is designed to perform within the constraints that are particular to Internet of Things devices, including restrictions on memory, size, power and processing capacity.

  • Technical Insights: 3 Strategies for Avoiding Windows IoT Key Theft

    Advantech provides complete IoT solutions to customers who integrate Advantech hardware and software for distribution. We offer a ready-to-use embedded OS image. It provides a complete set of components that enable rapid prototyping and application development. With Advantech’s technical support, we can ensure connectivity and device compatibility.

  • IoT Software at a Glance: Operating System Selection Guide for IoT Devices

    The ability of embedded systems to connect and communicate over a network is the essence of IoT. Indeed, IoT operating systems are a type of embedded OS and are, by definition, designed to enable data transfer over the internet.

  • Advantech Global Distribution Software License Product Guide

    Advantech, a global leader in embedded computing and Internet of Things (IoT) technology, is recognized as a Microsoft Global IoT Valued Partner and Authorized Embedded Distributor. We provide complete IoT solutions to customers who integrate Advantech hardware products and software for distribution. Also, we support the most popular open source projects and leading technologies to provide the best software solutions.

  • Blacklisting vs. Whitelisting: Choosing the best security solution for IoT devices

    Whitelisting and Blacklisting are not mutually exclusive. Despite this, users can’t always adopt both at the same time. Users may need to decide which option can best complement their security strategy.

  • The Ultimate Ransomware Battle Kit

    In this kit, we’ve pulled together the latest and greatest resources full of information about how to ward off the evils we now face. Here’s what’s included.

  • 7 Critical Reasons for Office 365 Backup

    You have one more reason added to the “6 critical reasons” for protecting your Office 365 data. This 5-minute read can help convince managers and peers that your organization has the responsibility and need for Office 365 data protection.

  • Five Ways to Improve Auditing of Your Hybrid Active Directory

    With native tools, auditing your hybrid Active Directory environment is a constant struggle. There’s no consolidated view of activity, and search, alerting and data retention are all sorely limited. Data isn’t even normalized across workloads!