Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Conversational Ransomware Defense and Survival

    The 2018 updated edition of the Conversational Ransomware Defense and Survival e-book is designed to help you understand the ransomware threat and to protect yourself and your organization from potential attacks.

  • Microsoft Vulnerabilities Report 2019

    The 2017 Microsoft Vulnerabilities Report reviews the latest trends and reveals that the number of published vulnerabilities has risen by 111% over five years. The ever-popular report makes the compelling case for least privilege, finding that of the 235 Critical vulnerabilities reported in 2017, 80% would be mitigated by removing local admin rights from users.

  • Buyer’s Guide for Complete Privileged Access Management (PAM)

    The Buyer's Guide for Complete Privileged Access Management (PAM) is the most thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. This 39-page PAM Buyer's Guide will help you identify where to begin your privileged access management project, how to progress to a better IT security posture, and what business outcomes to expect.

  • Just-In-Time (JIT) Privileged Access Management (PAM)

    This white paper includes an overview of JIT privilege management, provides tips on a practical model for achieving it, outlines parameters to build your JIT policy, and offers a glossary of key concepts and terminology.

  • Privileged Access Threat Report 2019

    In this fourth edition of BeyondTrust’s annual Privileged Access Threat Report, we’ll be exploring the 2019 threat landscape in detail, with a focus on how security decision makers are utilizing Privileged Access Management (PAM) solutions to mitigate these risks.

  • Integrating Password and Privilege Management for Unix and Linux Systems

    When organizations stitch together sudo and other tools as part of a fragmented approach to manage Unix/Linux privileged access, it almost invariably results in dangerous security gaps and management limitations. This places those organizations at a serious disadvantage when facing modern attacks and motivated adversaries, as well as when trying to enable new technologies across the business.

  • Not all Office 365 providers are created equal

    Read this eBook to find out how to select a CSP that will actively engage with you to discover and resolve user adoption challenges and provide proactive guidance with a direct line to Microsoft engineers.

  • Thriving in Threatening Times with IT Resilience

    Learn how your data protection and business continuity system can automatically identify an issue and take near-instantaneous action without waiting for human directions. Learn more.

  • Disaster Recovery Techniques that Stop the Enemy Within

    Most reports on data protection highlight external threats. You read a lot about the impacts of hurricanes, tornadoes, earthquakes, fires and malware, but a different class of threats are far more prevalent – those created by your own employees. Read on.

  • Disaster Recovery Testing, Your Excuses, and How to Win

    Are you 100% confident you can recover? In this paper, discover testing standards, common objections, and the newest technologies enabling effortless, zero resource daily testing. Learn more.

  • Backup and DRaaS IT Buyer's Guide - Four Ways to Beat Downtime

    With hundreds of vendors available, how do you pick the best Backup and Disaster Recovery solution for your organization? Learn more.

  • 9 Ways to Stay Undefeated Against Disasters

    At $9,000 a minute, downtime is expensive and IT managers need to do everything they can to increase uptime. Even just a 1% increase in uptime can save your company millions in negative business impacts. Learn the 9 steps you can take to protect against downtime. Learn more.

  • Digital Dialogue: Protect Your Network by Automating Endpoint Security

    Read this Digital Dialogue to find out what you can do to make sure every endpoint employees are using is secure by using technology providing complete control of all endpoints in your ecosystem.

  • Digital Dialogue: Automating Container Security with AWS and Lacework

    Read this Digital Dialogue to find out what you can do to protect your organization’s containers including ensuring consistent security infrastructure visibility, monitoring for breach detection and making sure systems interactions adhere to your security policies.

  • Building a Security Mindset

    With this paper you’ll find out how you and your team can help reduce the likelihood of fraud and other crimes by implementing tighter control of devices and documents, and learn the smartest and most efficient ways to safeguard your organization’s document security – both print and digital. Download and read this paper today!

  • Threat Impact and Endpoint Protection Report

    Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter. Despite the many security offerings available, organizations continue to fall victim to ransomware attacks. Learn more.

  • CEO Fraud Prevention Manual

    CEO fraud is responsible for over $3 billion in losses. Don’t be next. The CEO Fraud Prevention Manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim. Learn more.

  • Ransomware Hostage Rescue Manual

    Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention Checklist. Learn more.

  • Addressing the Top 10 Security Issues Organizations Face

    Cybersecurity must be a top-level priority for any organization and for many it is. Security should be viewed holistically and should include a range of elements, including layered, technology-based solutions on-premises and in the cloud; security awareness training to help employees become a more integral part of security defenses; the establishment of common-sense policies and practices that will bolster security defenses; and security education for the board of directors and senior managers to help them understand the critical role they play in enabling a culture of security.

  • The 2019 Phishing Industry Benchmarking Report

    The 2019 Study analyzed a data set of nearly nine million users across 18,000 organizations with over 20 million simulated phishing security tests. In this report, research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks.