Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Return of the Data - Backupify for Office 365

    Jedi, guardians of peace, are constantly seeking new knowledge to improve themselves and the world around them. So too should guardians of the data, the administrators of Office 365, learn everything there is to know about the cloud-based solution in order to ensure business critical files are safe from harm. With this eBook, get the facts straight on data backup and restore within Office 365 and go from data Youngling to data Master today. Learn more.

  • The IT Admin’s Checklist for Complete Office-Wide Computer

    Information Technology administrator? Communicating the value of computer security best practices to your end users isn’t always easy. To help end users better understand the value of safety over convenience, check out this guide packed with information on password and email best practices, as well as web and network security do’s and dont’s. Learn more.

  • Ransomware and Office 365 for Business: What You Need to Know

    Is your company using Microsoft Office 365 for Business? As the number of businesses falling victim to ransomware increases, you need to ensure your data is secure. This eBook is packed with security measures you can take to to fend off ransomware and keep your data secure and accessible at all times. Learn more.

  • Containing Targeted Cyber Attacks: Best Practices for Gaining Control over the Enterprise Endpoint Environment

    CounterTack’s Endpoint Threat Platform (ETP) empowers security teams with the behavioral and predictive intelligence they need, to adopt more agile and proactive threat management strategies, to protect sensitive data, and ensure uninterrupted business operations. Learn more.

  • What to Look For In Endpoint Detection & Response Tools and Services

    CounterTack’s Endpoint Threat Platform (ETP) empowers security teams with the behavioral and predictive intelligence they need, to adopt more agile and proactive threat management strategies, to protect sensitive data, and ensure uninterrupted business operations. Learn more.

  • Security Brief - Security Challenges in the New Threat Landscape

    CounterTack’s Endpoint Threat Platform (ETP) empowers security teams with the behavioral and predictive intelligence they need, to adopt more agile and proactive threat management strategies, to protect sensitive data, and ensure uninterrupted business operations. Learn more.

  • 5 Ways IT Pros Automate Business

    Learning how to streamline manual, repetitive tasks frees up technicians to work on the most valuable activities that support the business goals of their organizations. Learn more.

  • 7 Ways to Be Harder to Hack

    Call it layered security or defense in depth, but make sure that you use it. While the concept is as old as security thinking itself, that doesn’t make applying layers of security any less relevant. Learn more.

  • Ovum Report: The Clear Leader: Veeam

    Ovum has recognized Veeam as THE CLEAR LEADER in the new Ovum Decision Matrix: Selecting a Data Availability and Protection Solution for the Cloud Era, 2016 - 17, delivering the highest Execution & Technology assessment score compared to the competition. Read full report.

  • NetApp + Veeam: Customer Reference Book

    According to the 2017 Veeam Availability Report, the vast majority of organizations experience unplanned downtime that costs the average enterprise up to $21.8M per year. In addition to lost revenue and productivity, downtime can cause a loss of customer and employee confidence and damage to your brand identity. It doesn’t have to be that way - NetApp and Veeam® can help. Get the paper.

  • Advanced Data Protection Using Veeam and NetApp Technology

    Learn how organizations can attain RTPOs of <15 minutes for all applications and data while improving business speed when NetApp storage is combined with Veeam. Register now.

  • New 2017 Availability Report

    Veeam® commissioned ESG to survey over 1,000 global IT decision makers to better understand the protection, recovery, and Availability challenges they are facing today. Overall results were surprising! Learn more.

  • Best Practices for Evaluating Disaster Recovery Solutions

    Businesses today are more aware of the risks of a weak disaster recovery solution. This white paper lists best practices for evaluating DR solutions to ensure IT resilience. Read on.

  • The Phishing Breakthrough Point

    Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots. Learn more.

  • Your Money or Your Life Files! A Short History of Ransomware

    This white paper provides a history of ransomware and what you can do to prevent being attacked. Learn more.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Phishing and malware threats are skyrocketing as cybercriminals become more adept, stealthier and more able to penetrate your IT security defenses. The consequences of even a single attack penetrating your network can be devastating, resulting in enormous potential losses. Learn more.

  • Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

    For the second year in a row, leading IT analyst firm Enterprise Management Associates (EMA), has delved into the world of security awareness and policy training. Their latest research on this topic revealed that a tremendous shift in awareness training programs has taken place, especially in small and medium businesses. Learn more.

  • Get Your Ransomware Hostage Rescue Manual

    Being in IT I’m sure you know someone who’s been hit with ransomware or you have been through it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent it in the future? Now you do! Learn more.

  • 9 Ways to Stay Undefeated Against Disasters

    At $9,000 a minute, downtime is expensive and IT managers need to do everything they can to increase uptime. Even just a 1% increase in uptime can save your company millions in negative business impacts. Learn the 9 steps you can take to protect against downtime. Read on.

  • 5 Security and Efficiency Tools Every Hybrid Office 365 Enterprise Must Have

    Microsoft’s move to the cloud has left enterprises searching for Tools to streamline Office 365 or Hybrid Administration. This interactive Whitepaper will describe and demonstrate 5 Must have Tools for any Office 365 Enterprise customer. Read on.