Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Tales from the Dark Web

    Cybercriminals are well funded, organized, and increasingly sophisticated. They continue to leverage the deep and dark web to crowdsource the latest techniques and coordinate attacks. Learn more.

  • Quick Guide to Calculating the Cost of Ransomware

    Organizations need to determine what they are going to do in the event of ransomware- Pay, Not Pay, or Defend. The math is straightforward. Learn more.

  • Security Orchestration, Automation, and Response

    SOAR is a security technology platform that automates security operations without human intervention. Learn how it can optimize your cybersecurity response. Learn more.

  • Build Your Own SOC or Partner with an MSSP

    In today’s environment, organizations must improve their security posture. Learn how to weigh the costs/benefits of building your own SOC vs. partnering with an MSSP. Learn more.

  • 9 Ways Cybercriminals Disrupt Business Operations

    This e-book outlines the nine ways in which cybercriminals disrupt businesses with recommendations on how to defend against the attacks of today and tomorrow. Learn more.

  • Gain actionable insights in to your O365 environment immediately

    Take this free Office 365 Health Check to gain immediate insights in to optimizing your environment. Immediately see how many licenses are inactive, what services are not being used and where security vulnerabilities lie. Be the IT hero you've always dreamt of. Sign up for a free Health Check today!

  • Buyer’s Guide for Complete Privileged Access Management (PAM)

    The Buyer's Guide for Complete Privileged Access Management (PAM) is the most thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. This 39-page PAM Buyer's Guide will help you identify where to begin your privileged access management project, how to progress to a better IT security posture, and what business outcomes to expect.

  • Strategies to Keep Malware From Costing You Your Job

    Read this white paper to learn about strategies you can use to protect your IT infrastructure and your job, including getting executive support for security initiatives, consistently backup and test, and patch and update everything.

  • A 4-Tier Approach to Modern Data Protection - How NetApp & Veeam Pulls It All Together

    Today, backup software can recover in-place, instantiating volumes directly on the backup storage which enables organizations to significantly reduce recovery windows. Learn how NetApp and Veeam can deliver a complete, modern data protection storage platform with data tiering capabilities through an integrated storage and software solution. Learn more.

  • How to Achieve Flexible Data Protection and Availability with All-Flash Storage

    Read this paper to learn how using all-flash solid state technology is becoming a business enabler that can be used to simplify and reduce complexity, as well as boost productivity, while lowering cost. Find out more!

  • The Business Value of Using Veeam and NetApp to Reduce Data-Related Risks

    Recently, IDC interviewed organizations using Veeam® and NetApp storage solutions to manage and protect their data. The interviews showed that organizations using these joint solutions gained significant business value. This executive summary highlights key points from the IDC white paper: The Business Value of Using Veeam and NetApp to Reduce Data-Related Risks. Watch this video today!

  • Data ONTAP deployment with Veeam and NetApp

    Watch our VeeamLive episode with special guest, Taylor Riggan, for an extensive best practices guide for Veeam® Backup & Replication™ v9 in a NetApp environment. You’ll learn how to maximize your Data ONTAP deployment, orchestrate snapshots, backup from snapshots and more!

  • Maximize backup performance with Veeam Backup & Replication and NetApp EF- and E-Series storage

    A lab performance test of the Availability for the Modern Data CenterTM program at NetApp® Labs Munich shows backup speed does not serve as a limiting factor for the modern data center when customers use Veeam® Backup & ReplicationTM in combination with NetApp EF- or E-Series storage. Find out more.

  • NetApp and Veeam Backup & Replication 9.5: Configuration Guide and Best Practices

    Deliver Availability for the Always-On Enterprise™ with this configuration and best practices guide for Veeam® Backup & Replication™ 9.5 in a NetApp environment. Version 9.5 provides new levels of NetApp integration to orchestrate Data ONTAP, create application-consistent backups and enable fast recovery from NetApp storage snapshots. Learn more.

  • An All-Flash Solution for Achieving Always-On Availability

    Read this Tech Talk paper to find out how an all-flash solution can stave off disaster by providing availability and near-constant data access and fast and flexible recovery. Learn more.

  • Accelerating Digital Transformation through Hyper-Converged Solutions

    In a new CIO brief from TechTarget, Accelerating Digital Transformation through Hyper-Converged Solutions, we take a look at how IT and business leaders can turn the corner on IT complexity through a re-engineering of enterprise data centers, including sources and implications of IT complexity & strategies for IT simplification. Find out how to choose the right approach for your IT infrastructure. Learn more.

  • The 3-2-1 Data Protection Rule and Hybrid Cloud Backup with NetApp

    This paper describes how organizations can leverage the combination of storage snapshots, Availability software and hybrid cloud to cost-efficiently modernize data protection and recovery to enable the Always-On Enterprise™. Learn more.

  • 10 Crucial Audit Reports for IT Security

    Download this free e-book to learn about the ten must-have security reports for IT security and compliance.

  • The basics of auditing and securing your network perimeter with SIEM

    In this handbook, you'll learn about the basics of auditing and securing your network perimeter by leveraging a security information and event management (SIEM) solution.

  • Threat intelligence and the SIEM advantage

    Threat intelligence (TI) is the not-so-secret weapon the cybersecurity industry is using to step up its game against attacks. While it's been around for some time, only recently has threat intelligence been widely recognized. According to the SANS 2018 Cyber Threat Intelligence Survey, 81 percent of security professionals believe that investing in threat intelligence capabilities helped improve their organization's security posture—compared to 64 percent in 2016.