Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Solve the Problems Caused by B2B Guest

    Download this tech brief to understand how Quest Power365 solutions help you solve the problems that B2B guest user accounts create for your corporate partnerships, mergers, and acquisitions.

  • A Guide for Consolidating Active Directory, Exchange, and Office 365 After a Merger

    Day One of your merger or acquisition is in the books. You pushed hard to integrate the identity and messaging environments so that your users could start collaborating right out of the gate. Now, you’ve got a bit more breathing room to consolidate everyone onto the same platform. And you need to do it without disrupting your users. In this white paper, we walk you through what that process looks like.

  • Managing Remote Workstations with Active Directory Domain Joins

    Recently, with the rapid advance of employees working from home intensifying this issue, the net result is that remote machines pose a unique and growing problem for offline domain joins that are necessary to maintain business operations. We have prepared this white paper as a collation of our best practice recommendations for Active Directory management for domain consolidations.

  • Maintaining the Health of Active Directory

    Maintaining the health of your production AD environment is key to its performance, availability and security. The health of your AD infrastructure is also crucial for preventing roadblocks to significant IT changes like adding new applications, network upgrades, cloud migrations, or supporting a merger, acquisition or divestiture. This white paper is intended to provide insights on how to identify and remediate the potential issues with an Active Directory environment.

  • Nine Best Practices to Improve Active Directory Security and Cyber Resilience

    The anatomy of an insider threat and the best defense strategies.

  • Be Prepared for Ransomware Attacks with Active Directory Disaster Recovery Planning

    Ransomware attacks are skyrocketing. Here’s how to reduce your organization’s risk.

  • M&A IT Integration Checklist: Active Directory

    Few IT professionals have much experience with hybrid Active Directory migration projects. That’s why we’ve developed a checklist to help you keep track of the big items you need to consider in your planning and to spur discussion. It will help drive your conversations about the business and help your team understand which items your team can gloss over versus which ones they really need to dig into.

  • The Definitive Guide to SharePoint Migration Planning

    The most important part of any migration is the preparation — plan properly before you migrate anything, and not only will your migration go more smoothly, but you will have a healthier target environment going forward, which will reduce risk as well as support and maintenance costs.

  • Conversational Teams Management and Migration

    The pandemic forced many of us to quickly adopt solutions such as Microsoft Teams without having the luxury of having enough time for careful planning. This eBook provides a deep dive into Teams – what the native tools are and are not capable of, and why you may need to take a step back and consider the risks posed by your current Teams deployment.

  • What You Don't Know About Office 365 and Azure AD

    Moving to the Microsoft cloud? With this ebook, What You Don't Know about Office 365 and Azure AD, you can be prepared. It explores three of the key challenges you’ll face, filling in common knowledge gaps and debunking widespread misconceptions.

  • Top Seven Reports for Supporting a Growing Virtual Workforce

    IT environments are more dynamic than ever, and having more users working from home introduces new vulnerabilities. You undoubtedly want to take full advantage of the tools you already have to strengthen Office 365 security and compliance — but you probably just don’t have the time to go digging through them to find what you need.

  • Top 10 Active Directory Security Reports and Alerts You Need

    Check out this white paper to discover the top 10 reports and alerts you need to ensure the stability and security of your on-prem or hybrid Active Directory, and see how easily you can get them with Change Auditor.

  • 5 Ways BaaS and DRaaS Build the Strategic Value of IT

    Download this FREE e-book and learn about the ways that companies like yours use Veeam-powered backup and DR services to unlock the true strategic value of IT.

  • Bridging the Gap Between Microsoft Teams and On-Premises Telephone Networks

    This TechTalk white paper covers a recent Redmondmag.com Webcast featuring Nathan O’Bryan, a Microsoft Certified Solutions Master in messaging and Tom Minifie, Director of Product Management at OpenTextTM covered how to improve Teams’ performance and how an organization can maximize their investment through connecting Teams and existing voice infrastructure.

  • Save costs and achieve more with Red Hat OpenShift managed services

    Integrating Kubernetes into complex IT environments yourself can be difficult and time consuming. Red Hat works with key cloud provider partners to deliver fully managed container environment services that simplify deployment and operations. Four Red Hat® OpenShift® managed services are available, so you can choose the option that best fits your organization’s needs. Each service allows you to take advantage of flexible pricing models, reduce your support costs, increase operational efficiency, and free your staff to innovate. Read this brief to see how you can save costs and achieve more with Red Hat OpenShift managed services.

  • Simplify Kubernetes adoption

    Learn more about Red Hat OpenShift Service on AWS and how it brings together container platforms, cloud infrastructure, and support and operations for optimal results.

  • Boost database performance and agility

    Boost database performance, reduce costs, and prepare for future change with this hybrid cloud foundation for Microsoft SQL Server Workloads.

  • Fortify Active Directory to Improve Security and Efficiency

    Security and efficiency are top of mind for identity and access management (IAM) leaders, especially as they seek solutions to stave off breaches and grapple with enabling zero trust. Microsoft Active Directory (AD) and Azure AD may be your most important security tool. As the traditional perimeter dissolves into the cloud and distributed computing, how can AD/Azure AD fill the gap? Read this analyst Technology Spotlight, written by IDC’s Jay Bretzmann and Frank Dickson, to get an overview of how organizations can extend the capabilities of AD/Azure AD to limit cybersecurity vulnerabilities and bolster IT security.

  • BlueVoyant’s Modern SOC Executive Summary eBook

    Operationalize Your Microsoft 365 Security Capabilities and Stay Secure. Download the eBook today to understand the full scale and capabilities of the BlueVoyant Modern SOC. Company exposure today can appear in many different sizes and forms, resulting in a breach that can cost your organization millions of dollars. With BlueVoyant’s Modern SOC, you can stay secure by operationalizing the fully integrated Microsoft 365 security capabilities while utilizing our complete portfolio of security focussed services designed to come to you.

  • Uniting Managed Detection and Response (MDR) with Microsoft® Azure Sentinel and Microsoft® Defender XDR

    While other MSSP require data to be sent to their infrastructure and data centers for analysis, BlueVoyant’s service allows you to keep your data in your own environment, reducing cost, and ensuring stronger compliance. BlueVoyant’s Modern SOC provides a complete portfolio of Microsoft security-focused services, including a customized deployment of Microsoft security tools, ongoing platform care and maintenance, and 24/7 security operations as a service.