Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • CEO Fraud Manual

    Over the last three years, CEO fraud has been responsible for more than $26 billion in losses. Despite these losses, CEO fraud remains a blind spot for many C-level executives who quickly learn the consequences of a weak cyber-risk assessment. Part I explains how top executives in finance are hoodwinked, how organizations are compromised, how millions are siphoned off by criminals, and how fiduciary responsibilities play a role. Part II covers how to prevent this type of attack and what to do if you become the latest victim.

  • Ransomware Hostage Rescue Manual (New 2020 Edition)

    The New 2020 Edition of this Ransomware Manual is packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware. You will also receive a Ransomware Attack Response Checklist and Ransomware Prevention Checklist.

  • Phishing by Industry 2020 Benchmarking Report

    IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

  • Comparing DaaS Solutions

    IT departments all over are looking for new ways to build a reliable, secure, and efficient desktop virtualization foundation to keep up with growing cybersecurity threats, expanding BYOD and increases in remote workers. But traditional, on premises VDI deployments aren’t the only option anymore. Use this guide to learn more about hosted virtual desktops and desktop-as-a-service technology – and learn what questions you should be asking when deliberating between virtual desktop choices.

  • Research Report: Evaluating Your Organization’s Cybersecurity Readiness

    This report presents survey results and expert opinions about when and how to best leverage an MSSP, as well as the challenges you may encounter along the way.

  • Ransomware Response Report: Vol 1 Trends and Outlook

    This eBook, the first in the Ransomware Response Cycle explainer series, examines the current state of this newly prolific, dangerous, and incredibly profitable criminal endeavor.

  • Quick Guide to Calculating the Financial Risk of Ransomware

    Download this whitepaper for insights and calculations to do the math on what a ransomware attack could cost your business.

  • Mighty Guide: How to Build a World Class Cybersecurity Practice

    Security experts explore the challenges facing today’s security operations. They discuss in detail what it takes to build a world-class security practice capable of managing the growing volume and complexity of cyberthreats.

  • Everything You Should Know About Cybersecurity Assessment, Planning And Response

    This eBook discusses the constantly evolving threat landscape, the challenges facing businesses today, and what business leaders should understand about the state of their organization’s cyber protection.

  • Business Value of Securing the Hybrid IT with a Unified Identity

    This whitepaper walks through how modernizing your hybrid IT stack with Okta Access Gateway and Okta SSO can help lower TCO, improve productivity, reduce IT effort, enhance security, and accelerate modern IT.

  • eBook: Bringing Modern Access to Traditional On-Prem Apps

    A guide to deploying modern identity for hybrid environments. This guide walks through the drivers, considerations, solutions, phases, and best practices for modernizing identity and access management with Okta.

  • Tech Talk Paper: Make a Smooth Database Migration to Azure

    Any database migration involves numerous decisions. Do you know how to correctly narrow down the options? This white paper is packed with tips and expert advice from Microsoft MVP and trainer Tim Warner and experts from SolarWinds, who make sure to cover the best practices you need to know.

  • 2020 CIO Cloud Data Management Initiatives

    Read this new Frost & Sullivan executive brief and learn how to deliver Backup Modernization, Security & Compliance, Hybrid Cloud Acceleration.

  • The Future is Now: Creating an Intelligent Cloud Contact Center to Deliver Exceptional Experiences

    Today’s organizations compete on customer experience and this trend will define the shape and scope of contact centers well into the next decade. To deliver the level of seamless experiences that customers expect, contact centers will need to harness all the advantages technology can offer – specifically, the cloud – to create an “intelligent cloud contact center” that utilizes machine learning and real-time data analysis. In this paper you will learn three steps you need to transition to an intelligent cloud contact center.

  • 5 Ways to Empower Remote Agents to Deliver Great Customer Experiences

    Customer experience drives the success of your organization. Awesome systems for onboarding customers and supporting them can certainly establish an initial relationship, but what happens when something goes wrong or the systems in place get in the way of helping the customer? In this paper, we’ll explore five ways to help you empower your remote agent workforce.

  • Cloud CRM Integrations: Deliver Amazing Customer Experiences with Cloud-based CRM Integrations

    Today’s contact centers use customer relationship management (CRM) solutions from companies including Microsoft Dynamics, or homegrown systems to capture, store, and make customer information available. However, the contact center platform is often deployed in a silo and doesn’t have a way to easily interact with the CRM. This leaves agents without pertinent customer data to use while engaging with customers. In this paper you will learn why having your CRM tightly integrated with your contact center will help your agents deliver outstanding customer experiences.

  • Using Zero Trust To Kill The Employee Password

    This report compares authentication methods in use in today's organizations and offers steps to help S&R pros ditch the password for good and adopt a Zero Trust approach to authentication.

  • Businesses @ Work (from Home)

    This mid-year update to Businesses @ Work looks at the data from the Okta Integration Network (OIN) to understand how organizations are employing new apps and increasing adoption of existing technology to improve productivity and secure their remote workforce during this unique crisis. Our network now includes nearly 8,000 customers and over 6,500 integrations with cloud, mobile and web apps, and IT infrastructure providers.

  • DEMO VIDEO: VM Backup and Recovery

    Watch this short demo of Veeam® Backup & Replication™ to learn what it protects, its primary features and how to backup and recover virtual machines (VMs). This demo also includes an example of a quick deployment, the configuration of various backup jobs and recovery options for VMs.

  • DEMO VIDEO: Applications Recovery

    Watch backup demos for widely used applications and databases including: Microsoft Active Directory, Exchange, SharePoint and SQL server; Oracle and SAP HANA; Backup from Storage Snapshots.