Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Office 365 Backup For Dummies

    Get this easy-to-read e-book For Dummies, and learn how to best backup and protect your Office 365 data. It’s you data, it’s your responsibility to protect it!

  • 7 Critical Reasons for Office 365 Backup

    You have one more reason added to the 6 critical reasons to protect your Office 365 data. This 5-minute read document helps you convince your managers and peers that your organization needs Office 365 data protection.

  • 2021 Ransomware Retrospective Report

    Download the 2021 Ransomware Retrospective report to see how threats have changed the way we conduct business and provide a benchmark for the effectiveness of defenses.

  • 2021 Cloud Protection Trends Report

    Read this report and learn how respondents expect to be prepared for the myriad of IT challenges they face, including hybrid cloud solutions, disaster recovery initiatives, as well as SaaS and container usage.

  • 2021 Data Protection Trends

    2020 was a unique year that forever changed the IT landscape, creating new challenges for all. In the new Veeam report, more than 3,000 business and IT leaders across 28 countries were surveyed on their data management challenges and successes, including the impact 2020 had on IT. Download the 2021 Data Protection Trends report to learn about today’s data protection impact, costs and benefits with key insights from industry experts.

  • Redmond Intelligence Report: Kubernetes Readiness Assessment

    Where are you at in your Kubernetes journey? Take this 5 minute Kubernetes readiness assessment to find out!

  • How to get maximum productivity from your remote teams

    With remote work here to stay, however, the disparate point solutions of WFH 1.0 likely won’t maximize productivity in the long term. That’s because with multiple apps for messaging, video conferencing, phone, and critical business apps, employees end up inundated with tools that don’t work cohesively.

  • The State of Password Security in the Enterprise

    A recent authentication security strategy survey by Enzoic and Redmond magazine revealed insights into the way that passwords are currently being used in various organizations, and what the future looks like regarding this ubiquitous authentication method.

  • Five Considerations for Managing Your Kubernetes Clusters

    This checklist clearly discusses the key things to keep in mind when considering the management of your Kubernetes clusters. Learn expert best practices and top industry tips.

  • Boost hybrid cloud security

    81% of enterprises cite cloud security as a challenge. Learn the best practices for boosting your hybrid cloud security.

  • 7 characteristics of successful hybrid cloud strategies

    This checklist will give you the top 7 areas to consider when building a successful hybrid cloud strategy. Increase the potential of your cloud solution today.

  • 5 Questions to Ask When Choosing a Cloud Video Interop Solution

    Looking to bring the power of Teams video meetings to your existing room system investments and worried about a long, expensive transition? Cloud Video Interop (CVI) might be the solution for you!

  • CEO Fraud Manual

    Over the last three years, CEO fraud has been responsible for more than $26 billion in losses. Despite these losses, CEO fraud remains a blind spot for many C-level executives who quickly learn the consequences of a weak cyber-risk assessment. Part I explains how top executives in finance are hoodwinked, how organizations are compromised, how millions are siphoned off by criminals, and how fiduciary responsibilities play a role. Part II covers how to prevent this type of attack and what to do if you become the latest victim.

  • Comparing DaaS Solutions

    IT departments all over are looking for new ways to build a reliable, secure, and efficient desktop virtualization foundation to keep up with growing cybersecurity threats, expanding BYOD and increases in remote workers. But traditional, on premises VDI deployments aren’t the only option anymore. Use this guide to learn more about hosted virtual desktops and desktop-as-a-service technology – and learn what questions you should be asking when deliberating between virtual desktop choices.

  • The Future is Now: Creating an Intelligent Cloud Contact Center to Deliver Exceptional Experiences

    Today’s organizations compete on customer experience and this trend will define the shape and scope of contact centers well into the next decade. To deliver the level of seamless experiences that customers expect, contact centers will need to harness all the advantages technology can offer – specifically, the cloud – to create an “intelligent cloud contact center” that utilizes machine learning and real-time data analysis. In this paper you will learn three steps you need to transition to an intelligent cloud contact center.

  • 5 Ways to Empower Remote Agents to Deliver Great Customer Experiences

    Customer experience drives the success of your organization. Awesome systems for onboarding customers and supporting them can certainly establish an initial relationship, but what happens when something goes wrong or the systems in place get in the way of helping the customer? In this paper, we’ll explore five ways to help you empower your remote agent workforce.

  • Using Zero Trust To Kill The Employee Password

    This report compares authentication methods in use in today's organizations and offers steps to help S&R pros ditch the password for good and adopt a Zero Trust approach to authentication.

  • Businesses @ Work (from Home)

    This mid-year update to Businesses @ Work looks at the data from the Okta Integration Network (OIN) to understand how organizations are employing new apps and increasing adoption of existing technology to improve productivity and secure their remote workforce during this unique crisis. Our network now includes nearly 8,000 customers and over 6,500 integrations with cloud, mobile and web apps, and IT infrastructure providers.

  • Beat Ransomware - 3 Ultimate Strategies

    The war on ransomware is real. Today’s organizations need to have a strong, multi-layered defense and strategy to address ransomware. In this paper, Rick Vanover from Veeam® will provide organizations with practical steps they can take to protect data and avoid being in a situation where data loss or ransom payment are their only options.

  • Virtualized Databases: Performance Considerations for DBAs

    What impact does virtualization have on database instances? Find out what VMware metrics matter with SolarWinds new whitepaper that provides a guide for DBAs to determine the impact, if any, of virtualization on database performance.