Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Maximize backup performance with Veeam Backup & Replication and NetApp EF- and E-Series storage

    A lab performance test of the Availability for the Modern Data CenterTM program at NetApp® Labs Munich shows backup speed does not serve as a limiting factor for the modern data center when customers use Veeam® Backup & ReplicationTM in combination with NetApp EF- or E-Series storage. Find out more.

  • NetApp and Veeam Backup & Replication 9.5: Configuration Guide and Best Practices

    Deliver Availability for the Always-On Enterprise™ with this configuration and best practices guide for Veeam® Backup & Replication™ 9.5 in a NetApp environment. Version 9.5 provides new levels of NetApp integration to orchestrate Data ONTAP, create application-consistent backups and enable fast recovery from NetApp storage snapshots. Learn more.

  • 10 Crucial Audit Reports for IT Security

    Download this free e-book to learn about the ten must-have security reports for IT security and compliance.

  • The basics of auditing and securing your network perimeter with SIEM

    In this handbook, you'll learn about the basics of auditing and securing your network perimeter by leveraging a security information and event management (SIEM) solution.

  • Threat intelligence and the SIEM advantage

    Threat intelligence (TI) is the not-so-secret weapon the cybersecurity industry is using to step up its game against attacks. While it's been around for some time, only recently has threat intelligence been widely recognized. According to the SANS 2018 Cyber Threat Intelligence Survey, 81 percent of security professionals believe that investing in threat intelligence capabilities helped improve their organization's security posture—compared to 64 percent in 2016.

  • Data Privacy Is The New Strategic Priority

    This commissioned study conducted by Forrester Consulting evaluates the state of enterprises’ data privacy compliance in a shifting regulatory landscape.

  • Is Your Company In Peril If Critical Data Is Breached?

    Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives.

  • The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

    The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.

  • The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

    The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.

  • Eliminating the Burden of Periodic Password Reset in Active Directory

    Many organizations are adopting the NIST 800-63b password guideline to stop forcing periodic password resets for users. Why? Because compromised password screening in Active Directory can replace it. Read this article to learn more.

  • Continuous Compromised Password Monitoring in Active Directory

    Are you screening passwords to prevent ongoing use of compromised and common passwords as NIST recommends? Can you screen passwords against cracking dictionaries and automatically run a daily screen in Active Directory? Now you can.

  • Managing Containers & Multicloud Complexity at Scale

    The difference between industry leaders and their competitors rests on their applications: how quickly can they innovate, bringing new features and offerings to market, and how well do those applications perform for their customers. To bring ideas to market faster, organizations are adopting container technologies and driving multicloud strategies.

  • A Quick Guide to Office 365 Backup & Restore

    Protect your organization's Office 365 and SharePoint data. BACKUP to AWS enable a point-in-time RESTORE with an unlimited retention period. This short, easy-to-read free ebook provides valuable information on how business should assume responsibility for data proctection in the cloud.

  • 8 Best Practices for Keeping Your Active Directory Clean and Secure

    Did you know that an estimated 70% of U.S. employees lack a basic understanding of cybersecurity best practices, according to the Pew Research Center. Download this guide.

  • Klein Independent School District Enhances Security With High-Performance SSL Decryption

    Read this case study covering the competitive evaluation that led Klein ISD to select A10 Thunder® SSLi® (SSL Insight) to offload decryption functions and create a secure decrypt zone.

  • Data Privacy Is The New Strategic Priority

    This commissioned study conducted by Forrester Consulting evaluates the state of enterprises’ data privacy compliance in a shifting regulatory landscape.

  • Is Your Company In Peril If Critical Data Is Breached?

    Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives.

  • Hardening Your AD Security

    Cybersecurity visibility and enforcement begins with Active Directory. Because AD governs whether access should be granted, adding a cybersecurity context to this level empowers security teams to make pre-access enforcement decisions before damage can occur.

  • The Veeam Best Practice Solution for Countering Ransomware

    Most IT leaders today acknowledge that a cyber-attack is imminent so discussions about prevention are quickly followed by discussions about recovery strategy. This white paper outlines best practices for quick and easy recovery from Ransomware.

  • How to Accelerate Your AWS Cloud Journey to Reach Cloud Maturity

    With This Guide, You'll Learn: How to determine if you have clear visibility into your AWS environment, with a checklist to help identify components for proper cloud visibility...