Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Digital Dialogue 5 Key Insights for IT Managers on the New Hybrid Workforce Reality

    Expert tips, best practices and insights gleaned from the recent Webcast, “Navigating Your Hybrid Workplace Strategy.”

  • Phoning It In With Microsoft Teams

    Microsoft Teams experienced massive usage growth in the last year as it became a go-to platform for a suddenly remote workforce. Now that the collaboration platform has proven its value, organizations are looking to extend its communication value with capabilities like external calling, contact centers and more. Download this eBook from OpenText to learn how.

  • Office 365 Backup for Dummies

    Download this eBook to gain a formulaic approach to quantifying technical recovery capabilities, business impacts, and financial concerns related to data protection.

  • 7 Critical Reasons for Office 365 Backup

    You have one more reason added to the 6 critical reasons to protect your Office 365 data. This 5-minute read document helps you convince your managers and peers that your organization needs Office 365 data protection.

  • Achieving Interactive Agility: Work From Home, the Office, or Anywhere with Microsoft Teams

    As employees partially return to the office this summer, organizations face a lot of choices about how to enable the most effective meetings for a hybrid workforce. Find out how BlueJeans Gateway can extend Microsoft Teams to leverage existing or future investments in office-based audio/visual conferencing systems.

  • Essential Guide to Securing Microsoft Active Directory

    Securing Microsoft Active Directory (AD) involves dealing with a mixed bag of risks, ranging from management mistakes to unpatched vulnerabilities. AD has become a prime target for cyber-attackers who use AD to elevate privileges and gain persistence in the organization. Investigate a typical data breach, and you’ll find that stolen credentials likely were used—sometimes for initial entry, sometimes for accessing critical systems, but always to the detriment of the targeted organization.

  • Navigating the Shift to Public Cloud Security With a DevSecOps Mindset

    The rising number of cloud data breaches due to simple service misconfigurations is forcing cloud security owners to rethink security practices. In this eBook, we’ll explore how to navigate the shift to public cloud security.

  • Comparing AWS Tools for Cloud Cost Management and Optimization

    AWS customers often encounter much larger bills than expected. This ebook lays out the services that AWS provides to help with cloud cost management, and helps you understand how to navigate your options.

  • Your Cheat Sheet to Amazon Cloud Storage Pricing

    To help you understand the costs of your cloud services, we’ve created a pricing cheat sheet of the three most common AWS cloud storage services: object storage (S3), block storage (EBS), and file storage (EFS).

  • The Ultimate Guide To AWS Savings Plans

    This guide includes example scenarios where AWS Savings Plans should be used, considerations to take into account before committing to AWS Savings Plans, and answers to frequently asked questions.

  • The Next Generation of Cloud Management Starts with a Cloud Center of Excellence

    To help ensure your organization can keep up with the pace of change in cloud management, here's a guide on how to establish a Cloud Center of Excellence, including examples of successful implementation with other organizations.

  • How To Accelerate Your AWS Cloud Journey To Reach Cloud Maturity

    The goal of this eBook is to help you gain control of your AWS costs, security, and governance, where cost and performance are optimized and your cloud environment is governed by policy-driven automation.

  • Common Culprits for Unexpected AWS Cost Spikes

    AWS offers a myriad of innovative services, but it can be hard to estimate the costs for some of these solutions. Here are five services to keep close tabs on throughout your cloud journey.

  • Building a Successful Cloud Financial Management Practice

    This paper details a set of organizational best practices and principles, outlining key stakeholder groups, roles, and responsibilities, to help you plan, build, and execute a successful cloud financial management strategy.

  • Benchmark Your Cloud Maturity: A Framework for Best Practices

    The biggest challenges for organizations that embrace the public cloud are often related to people and processes, not technology. This whitepaper lays out a framework for best practices in cloud operations, cost management, and security.

  • 8 Best Practices for Reducing Spend in Azure

    To help organizations take control of their cloud costs, we provide eight best practices to reduce spend in Azure, including customer examples and practical applications.

  • Uniting Managed Detection and Response (MDR) with Microsoft® Azure Sentinel and Microsoft® Defender XDR

    While other MSSP require data to be sent to their infrastructure and data centers for analysis, BlueVoyant’s service allows you to keep your data in your own environment, reducing cost, and ensuring stronger compliance. BlueVoyant’s Modern SOC provides a complete portfolio of Microsoft security-focused services, including a customized deployment of Microsoft security tools, ongoing platform care and maintenance, and 24/7 security operations as a service.

  • BlueVoyant’s Modern SOC Executive Summary eBook

    Operationalize Your Microsoft 365 Security Capabilities and Stay Secure. Download the eBook today to understand the full scale and capabilities of the BlueVoyant Modern SOC. Company exposure today can appear in many different sizes and forms, resulting in a breach that can cost your organization millions of dollars. With BlueVoyant’s Modern SOC, you can stay secure by operationalizing the fully integrated Microsoft 365 security capabilities while utilizing our complete portfolio of security focussed services designed to come to you.

  • 7 Experts on Implementing Microsoft Defender for Endpoint

    As with other security tools in the Microsoft 365 Defender suite, deploying Microsoft Defender for Endpoint is easy. With the right licensing, you can turn the tool on with just a few clicks. Turning it on and maximizing its effectiveness, however, are two completely different things. Find out what advice our seven security experts give on transitioning to and optimizing Microsoft Defender for Endpoint.

  • 7 Experts on Implementing Azure Sentinel

    One big challenge for many security teams is consolidating and analyzing the data generated in a networked environment. Organizations attempt to address this challenge by using a security information and event management (SIEM) system to collect that data for analysis. In addition to being a best-in-class SIEM system, Azure Sentinel is a platform for security orchestration, automation, and response capable of automating playbooks; monitoring both Windows and Linux environments; and monitoring Amazon, Google, and Azure clouds—and that’s just for starters. Find out what advice our seven security experts give on transitioning to and optimizing the Azure Sentinel solution.