Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Small Business Under Attack

    No matter what size your business, you can’t ignore cybercrime. You can’t ignore hackers and the increasingly sophisticated malware they are continually unleashing on the internet. You can’t be complacent and think you’re not a target. Everyone is a target. This guide explores the best practices every SMB needs to know, including security best practices, mistakes companies make and the threats they face.

  • Fighting Back Against the Ransomware Epidemic

    Not all ransomware is created equal. Some variants have been cracked, but in most situations, there’s no such hope. Businesses should take every step to avoid getting hit. And that means building your defenses against ransomware with user education, endpoint security, layered defense and a data backup strategy. This eBook will get you started.

  • Employees at the Frontline in the Battle Against Ransomware

    By many reports, ransomware has been already responsible for causing hundreds of millions of dollars in damages, with no end in sight. Find out how you can help to combat these attacks by training your employees to create a human firewall in the battle against ransomware.

  • Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

    Research Report on Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

  • What You Need to Know About Ransomware

    Free your files! Get the most informative and complete Ransomware Hostage Rescue Manual. This manual is packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Phishing and malware threats are skyrocketing. To combat these attacks, read this new Osterman Research white paper that gives you a list of high-priority actionable items, all related to IT security.

  • Your Money or Your Files! A Short History of Ransomware

    Cybercrime ransomware attacks are evolving rapidly and getting more sophisticated every month. Learn about the history of ransomware and what you can do to prevent being attacked.

  • The Phishing Breakthrough Point

    This whitepaper answers questions to: What is the breakthrough point in an organization's phishing awareness level? What metrics need to be put in place to prevent social engineering blind spots? And how effective can phishing awareness training be in protecting your network?

  • Master of Your Virtual IT Universe: Trust But Verify at Any Scale

    This ebook covers practical examples of optimization, automation, and reporting in the virtual data center. In this case, order does matter. Automating without considering optimization leads to work being done without purpose. Optimization and automation without reporting leads to not getting credit for work being done correctly. Also, without reporting, you can’t advise critical decision makers about how or when to take the proper course of action on a variety of issues.

  • 2017 Skyport Systems Active Directory Assessment Findings

    Through our numerous Active Directory assessments, Skyport helps organizations evaluate current safeguards, compare them to best practices, identify gaps and develop a phased plan to improve protections. Read more!

  • Top 10 Best Practices for Windows 10 OSD

    Read this white paper to learn 10 best practices for administrators to create and deploy an operating system image with ConfigMgr OSD starting with defining and documenting your requirements and process.

  • Rapid Windows 10 Deployment

    Read this white paper to learn how Adaptiva LiveFlow™ provides IT administrators with complete visibility and control over every single content transfer to make Windows 10 migrations safe and secure.

  • SCCM Security Best Practices

    Read this white paper to learn 20 best practices for administrators to see if they are covering some key SCCM security essentials starting with restricting and reviewing SCCM administrative users.

  • GameChanger Report: Fax and FTP Are Alive and Kicking But Security Risk and Cost Need to be Addressed

    Read this GameChanger on secure file transfer sponsored by Biscom to learn about solutions for modern document transfer including Secure File Transfer (SFT), Intelligent FAX, encryption in-transit, and automated workflow.

  • Gartner Innovation Insight: Dynamic Optimization Technology for Infrastructure Resources and Cloud Services

    With increasing business unit IT spending on cloud services, IT leaders must prevent new risks, sprawl, cost overruns and missed SLAs. Dynamic optimization technology can help balance the benefits of agility with required governance controls for cloud services and virtualized infrastructure. Read more!

  • Capacity Management in the Modern Data Center

    Capacity management has existed since the advent of server-based computing, dating back to the age of the mainframe. Commercial tools have existed for over 30 years with each successive generation of server platform creating its own unique requirements. This white paper explores the traditional methods of capacity management, the new approach IT must adopt to stay competitive and how you can assure application performance while scaling your infrastructure.

  • Public Cloud Guide

    When Amazon Web Services officially launched in 2006 it was fulfilling a growing need for self-service computing. The dot-com era had come and gone. A digital economy was growing out of the ashes. Today, a decade later, applications have become the lifeblood of the enterprise. With a mandate to build more and build faster, on-demand cloud computing has been a godsend to developers. Learn more.

  • The Path to Hybrid Cloud

    The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. With public cloud advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, When and Where do you run workloads to guarantee performance while maximizing the efficiency. Read now!

  • The CIO Guide to Autonomic IT

    Organizations are adopting cloud computing to accelerate service delivery. Some try to deliver cloud economies of scale in their private data centers with the mantra “automate everything,” a philosophy often simpler in theory than practice. Others have opted to leverage public cloud resources for the added benefit of the pay-as-you-go model, but are finding it difficult to keep costs in check. Regardless of approach, cloud technology poses the same challenge IT has faced for decades: how to assure application performance while minimizing costs. Learn more.

  • Backupify for Office 365: Return of the Data

    As more universities fall victim to ransomware attacks in Office 365, have you ensured your data is protected? Grab this great eBook and learn how to fend off ransomware and keep your school’s data secure. Read now!