Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Backup and DRaaS IT Buyer's Guide

    When it comes to data protection and business continuity, what is your goal? That’s easy – a solution you know will work every time, protecting everything you have in your data center with absolutely zero downtime and zero data loss. Selecting the right solution is increasingly more than just about basic backup. Learn what to look for, and potential gaps in coverage, to put your organization in the best position to achieve the lofty goal of total protection. Read on.

  • Best Practices for Implementing Security Awareness Training

    Osterman Research developed this whitepaper to understand the current state of security awareness training through an in-depth survey of security professionals, and to offer advice about best practices that organizations should consider as they develop a robust training program for their employees. Learn more.

  • Do I Really Need Office 365 Backup?

    Read this paper to find out what you need to do to assure your data can be quickly restored after a disaster, and archived for legal, industry, and government requirements. Learn more.

  • How To Fortify Your Organization's Last Layer of Security

    Download this paper to learn how to best combat these threats including 5 recommended actions you can take to fortify your organization's last layer of security - your employees. Learn more.

  • The 2018 Ransomware Hostage Rescue Manual

    Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention Checklist. Learn more.

  • How To Transform Employee Worst Practices into Enterprise Best Practices

    The bad guys are just one gullible user click away from staging an all-out invasion on your network. Get clear direction on how to go about improving your organization’s security posture against social engineering attacks. Learn more.

  • Forrester Total Economic Impact Study

    Read this study for an in-depth explanation of Forrester’s analysis and a detailed walk-through of KnowBe4's impact on our customer’s business. The resulting research paper assesses the performance of the KnowBe4 Platform. How does 127% ROI with a one month payback sound? Learn more.

  • Employees at the Frontline Against Ransomware

    The recent escalating ransomware attacks have shown that no organization is safe. Find out how you can help to combat these attacks by training your employees to create a human firewall in the battle against ransomware. Learn more.

  • 2018 Phishing By Industry Report

    In this report, brand-new research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks. Learn more.

  • Best Practices for Protecting Against Phishing, Ransomware, and Email Fraud

    This new Osterman Research paper outlines ten best practices to consider that show how a combination of risk assessment and audits of your current security posture, implementing end-user security awareness training, and establishing detailed security policies can protect your organization from ransomware, CEO Fraud and other phishing attacks. Learn more.

  • Detect Advanced Threats with Endpoint Detection and Response (EDR)

    As malicious actors target endpoints with new types of attacks designed to evade traditional antivirus tools, security teams are looking to endpoint detection and response (EDR) solutions for an additional layer of security. In this solution brief, you will learn how AlienVault’s approach to delivering advanced EDR capabilities enables you to automate threat hunting and detect evasive threats that traditional antivirus can’t. Learn more.

  • Security Information and Event Management (SIEM) Mid-Market Analysis

    This Executive Brief is based on the 2017 Frost & Sullivan report, “Security Information and Event Management (SIEM)—Global Market Analysis, Forecast to 2021” which provides an analysis of the SIEM market, examines the innovations driving that market and compares the positions of leading competitors. Learn more.

  • Top 10 PCI DSS Compliance Pitfalls and How to Avoid Them

    In this white paper, we’ll walk through the most common PCI DSS pitfalls, and what you can do to avoid them. Despite the fact that PCI DSS has been in effect for over a decade, and most merchants are achieving compliance, some of the world’s largest retailers have still been hit by data breaches. The sad truth is that achieving compliance doesn’t guarantee data protection, even for large organizations. Learn more.

  • Beginner's Guide to AWS Security Monitoring

    This report will examine a number of these concerns in detail, and specifically address how to avoid making costly mistakes that can leave data exposed. You’ll learn the 3 biggest concerns in cloud security and what steps to take to fix these concerns. Learn more.

  • Insiders Guide to Incident Response

    Get All 5 Chapters of AlienVault’s Insider’s Guide to Incident Response in 1 eBook! The Insider’s Guide to Incident Response gives you an in-depth look at the fundamental strategies of efficient and effective incident response for security teams that need to do more with less in today’s rapidly changing threat landscape. Learn more.

  • How to Build a Security Operations Center on a Budget

    Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. Learn more.

  • Five Endpoint Attacks Your Antivirus Won’t Catch: A Guide to Endpoint Detection and Response

    In this white paper you’ll discover how attackers have adapted their tactics to evade traditional antivirus, how these increasingly common attacks work, and how to detect advanced endpoint threats with EDR. Download it today to learn how to quickly evolve your threat detection strategy Learn more.

  • Unified Security Management vs. SIEM: a Technical Comparison

    Get a full overview of the changing security landscape, and more importantly insight into the rapidly changing SIEM category, and the reasons that have led to those changes. To offer a complete picture of the changes to SIEM technology, it is valuable for some to understand the context of the SIEM market and how (and why) AlienVault differentiates itself form the traditional approach. Learn more.

  • Best Practices for Office 365 Security Monitoring

    For many organizations, Office 365 marks an entry point into cloud computing—and with it, cloud security. As organizations migrate sensitive and business-critical data to the Microsoft cloud, many security concerns arise: Is our data secure? Who has access to it, both internally and externally? What if unauthorized users compromise account credentials? How can we detect ransomware and other malware in Office 365? What do we need to do to maintain compliance? Learn more.

  • Beginners Guide to SIEM

    Need a crash course on SIEM? No problem. Security Information and Event Management (SIEM) platforms provide real-time correlation of events generated from network security controls. Our security gurus will explain what SIEM is (and isn’t) and how to get up and running with it quickly and painlessly. Learn more.