Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Vendor Profiles Click on logo to view PDF

Free White Papers Sponsor Index

  • User Lifecycle Mismanagement: Why It’s Killing Your Company

    Read this white paper to find out what you can do to protect your company with better user lifecycle management, including automating the user lifecycle, enabling user self-service, Initiating role based administration, automating provisioning. Read more!

  • The One Foundational Flaw in Every Major Security Project

    Read this GameChanger to find out what you need to do to make sure your security initiatives avoid the foundational flaw with Active Directory groups that are undermanaged, over-permissioned, and empower inappropriate access.

  • White Paper Cover

    PRIMEFLEX® vShape® Gets Your Data Center Into Shape

    IT infrastructure can be complex. Imagine how much time and money you could save if you could eliminate infrastructure complexity. Whether you want more performance and reliability for your business-critical applications, or need a platform for desktop virtualization or business intelligence, Fujitsu PRIMEFLEX® vShape® can make all of this possible quickly, while reducing risks.

  • The Cloud Fax Advantage

    Despite common belief, fax is NOT dead. It is a vital means of communication within the business process. Discover how to repurpose IT resources to core business, reduce fax-related costs and consolidate servers. Read now!

  • Use Office 365 as an Intranet Portal

    Read this whitepaper, written for a small to medium businesses looking to get more out of Office 365, for advice on deploying Intranet portals at SMBs, including best practices, advice on strategies, and recommend specific solutions. Learn more.

  • The 7 New Rules of Recovery (eBook)

    The rules for backup and recovery have changed to meet the challenges of today’s digital world. It’s time to transform your approach to business continuity in order to keep your business moving – no matter what. Learn more.

  • Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup (ebook)

    Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365. Learn more.

  • DCIG 2016-17 Hybrid Cloud Backup Appliance Buyer’s Guide

    This Buyer's Guide evaluates the full range purpose-built backup appliance product capabilities, including features that enable the long-term retention of backups in the cloud and even application recovery in the cloud. Learn more.

  • DCIG 2016-17 Integrated Backup Appliance Buyer's Guide

    This Buyer’s Guide highlights the most robust and feature rich integrated backup appliances available on the market today. Learn more!

  • Trends in Server Virtualization

    Virtualization has changed the modern data center forever. But when it comes to effective data backup and disaster recovery strategies, most organizations are still developing their best practices. This eBook walks you through everything you need to plan an effective strategy step by step. Read more.

  • Managing Microsoft Access Applications in the Enterprise

    Read this white paper to find out how Access consultants can provide skills and tools to help IT ensure that Access applications follow security, testing, and auditing requirements that assure business governance standards are met. Learn more now.

  • Automating, Fax, Email and EDI Orders in an ERP Environment

    In a perfect world, every sales order your company receives would go straight into your ERP system. Learn how to help make your perfect world a reality by automating fax, email and EDI orders into ERP applications. Learn more.

  • CEO Fraud Prevention Manual

    This CEO Fraud Prevention Manual provides a thorough overview of how to deal with this exponentially growing wave of cybercrime. The manual explores how top executives in Finance are hoodwinked, how companies are compromised, how millions are siphoned off by criminals, how to prevent attacks and much more. Read on.

  • DDoS Attack: Smoke Screen or Smoke Signal?

    Read this white paper to learn how to recognize a smoke screen attack and stop it from disrupting or disabling the sensors and tools used to detect or prevent an intrusion, and masking a more serious intrusion. Read more now!

  • IoT DDoS Attacks Show The Stakes Have Changed

    Read this white paper to learn how DDoS attack capabilities can be successfully mitigated by implementing Best Current Practices (BCPs) and by utilizing intelligent DDoS mitigation systems such as Arbor Cloud DDoS Protection Services. Read more now!

  • DDoS: The Stakes Have Changed, Have You?

    Read this white paper to learn how you can mitigate the dangers of DDoS attacks by dispelling common myths including: All DDoS attacks are huge – they only target big businesses, not companies like ours. Read more now!

  • White Paper Cover

    CyberArk Labs Research: Analyzing Ransomware and Potential Mitigation Strategies

    This paper documents research conducted by CyberArk Labs to investigate ransomware and learn which potential mitigation strategies could be most effective. Before assessing potential mitigation strategies, the CyberArk Labs research team first sought to understand how ransomware typically behaves.

  • White Paper Cover

    2016 State of DevOps Report

    Download Puppet’s 2016 State of DevOps Report and discover how DevOps practices impact IT and organizational performance from deploying 200x faster to spending 22% less time on unplanned work.

  • White Paper Cover

    Containers 101

    Unsure of what containers are and what's possible with them? Download this Containers 101 guide and explore the uses, value, and benefits of containers.

  • White Paper Cover

    Cloud and the Enterprise: Benefits, Pitfalls and How Puppet Helps

    See real-world stories from Puppet customers using the cloud for development and testing environments, internal private clouds, native cloud applications, and hybrid cloud deployments.