Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Top 10 Security Events to Monitor in Azure Active Directory and Office 365

    Is your organization really more secure now that you’re running applications in the cloud? Don’t forget that users can still perform high-risk actions in the cloud, and account credentials can still be compromised. Unfortunately, native auditing tools for Office 365 and Azure AD retain audit events in logs for only a limited time. They offer only a small window into security events and leave a lot of work to the system administrator.

  • The Definitive Guide to SharePoint Migration Planning

    The most important part of any migration is the preparation — plan properly before you migrate anything, and not only will your migration go more smoothly, but you will have a healthier target environment going forward, which will reduce risk as well as support and maintenance costs.

  • Effective License Management with a Changing Remote Workforce

    Office 365 and Azure AD licenses often consume the biggest chunk of IT budgets. Are you paying more — maybe a lot more — than you need to?

  • Merger and Acquisition IT Integration: Active Directory

    If your organization is involved in a merger and acquisition, the impending IT integration project might seem overwhelming. But it needn’t be. In fact, the project can be the perfect opportunity to clean up, consolidate and modernize your Microsoft IT infrastructure to meet the business requirements you’re facing anyway.

  • Cloud Guide: Disaster Recovery and Data Protection with Zerto and Microsoft Azure

    This guide aims to provide you with an understanding of the driving factors behind why the cloud is being adopted en-masse, as well as advice on how to begin building your own cloud strategy. You’ll find out how, by embracing the cloud, organizations can achieve true IT Resilience – the ability to withstand any disruption, confidently embrace change and focus on business.

  • The Gorilla Guide to…Express Edition: IT Resilience with Microsoft Azure

    Working with a complex mix of on-premise and cloud IT infrastructure? Facing challenges of navigating disparate technologies or outdated backup? It’s time for IT Resilience in the cloud with Zerto and Microsoft Azure. With powerful continuous data protection, super simple application mobility and cloud agility capabilities, Zerto IT resilience can get you to, from and between clouds in no time flat. Download this Gorilla Guide to understand how to move beyond simple backup and disaster recovery!

  • The Wonderful World of ODX

    In this first of a three-part series, by Barry Devlin, you'll learn about a data architecture for analytics and AI supporting multiple types of data and analysis and how TimeXtender will get you there faster.

  • Time is money, but so is your data.

    Time Is Money, but So Is Your Data, the new e-book from TimeXtender and Microsoft will help you make sense of the big-data revolution by using a data-management platform that streamlines data access, modeling, and preparation.

  • Buyer’s Guide for Complete Privileged Access Management (PAM)

    Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organization’s most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an “insider”.

  • Enable & Secure Your Remote Workforce

    IT departments are under incredible pressure to maintain the business productivity for an expanded remote workforce that is exponentially larger than it was just a few weeks ago.

  • Just-In-Time (JIT) Privileged Access Management (PAM)

    This white paper includes an overview of JIT privilege management, provides tips on a practical model for achieving it, outlines parameters to build your JIT policy, and offers a glossary of key concepts and terminology.

  • Microsoft Vulnerabilities Report 2020

    The BeyondTrust Microsoft Vulnerabilities Report, produced annually, analyzes the data from security bulletins issued by Microsoft throughout the previous year. Every Tuesday, Microsoft releases fixes for all vulnerabilities affecting Microsoft products, and this report compiles these releases into a year-long overview, creating a holistic view of trends related to vulnerabilities and, more importantly, how many Microsoft vulnerabilities could be mitigated if admin rights were removed from organizations. This is the 7th annual edition of the Microsoft Vulnerabilities Report, and includes a five-year trend comparison, giving you a better understanding of how vulnerabilities are growing and in which specific products.

  • 5 Questions to Ask When Choosing a Cloud Video Interop Solution

    Looking to bring the power of Teams video meetings to your existing room system investments and worried about a long, expensive transition? Cloud Video Interop (CVI) might be the solution for you!

  • Quick Guide to Calculating the Financial Risk of Ransomware

    Download this whitepaper for insights and calculations to do the math on what a ransomware attack could cost your business.

  • Everything You Should Know About Cybersecurity Assessment, Planning And Response

    This eBook discusses the constantly evolving threat landscape, the challenges facing businesses today, and what business leaders should understand about the state of their organization’s cyber protection.

  • Research Report: Evaluating Your Organization’s Cybersecurity Readiness

    This report presents survey results and expert opinions about when and how to best leverage an MSSP, as well as the challenges you may encounter along the way.

  • Mighty Guide: How to Build a World Class Cybersecurity Practice

    Security experts explore the challenges facing today’s security operations. They discuss in detail what it takes to build a world-class security practice capable of managing the growing volume and complexity of cyberthreats.

  • Ransomware Response Report: Vol 1 Trends and Outlook

    This eBook, the first in the Ransomware Response Cycle explainer series, examines the current state of this newly prolific, dangerous, and incredibly profitable criminal endeavor.

  • Digital Dialogue: Secrets of Successful Hyper-Converged Infrastructure (HCI) Implementations

    Check out this guide with eight takeaways on hyper-converged infrastructure from the experts presenting at the recent Redmondmag.com and Virtualization and Cloud Review virtual summit, "Maximizing HCI." Includes tips on monitoring and validating the solution and for managing your HCI team.

  • Checklist: 10 Considerations for Kubernetes Deployments

    Learn how these 10 considerations for Kubernetes deployments can help organizations successfully start container development.