Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Privileged Access Management (PAM) Buyer’s Guide and Checklist

    Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organization’s most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an “insider”.

  • IT Strategy Guide to Building a Just-In-Time (JIT) Privileged Access Management (PAM) Model

    This white paper includes an overview of JIT privilege management, provides tips on a practical model for achieving it, outlines parameters to build your JIT policy, and offers a glossary of key concepts and terminology.

  • Enable & Secure Your Remote Workforce

    IT departments are under incredible pressure to maintain the business productivity for an expanded remote workforce that may already be exponentially larger than it was just a few weeks ago. As many IT teams work overtime to enable remote workers, the risks of not maintaining security practices are also top of mind, with the acute awareness that threat actors are actively seeking opportunities to benefit from current circumstances.

  • Optimize your Endpoint Security Strategy - The Critical Steps

    Endpoint security is an ecosystem--not a single solution. Endpoint security has evolved considerably over the last decade as workforces and assets have become more distributed, environments have increasingly moved to the cloud, and the number and types of endpoints has exploded.

  • Universal Privilege Management: The Journey to Securing Every Privilege, Every Time

    The Universal Privilege Management model secures every user, session, and asset across your IT environment. With the BeyondTrust approach, you can start anywhere, with the privileged access management (PAM) use cases that are most urgent to your organization, and then seamlessly address remaining use cases over time.

  • Microsoft Vulnerabilities Report 2020

    The BeyondTrust Microsoft Vulnerabilities Report, produced annually, analyzes the data from security bulletins issued by Microsoft throughout the previous year. Every Tuesday, Microsoft releases fixes for all vulnerabilities affecting Microsoft products, and this report compiles these releases into a year-long overview, creating a holistic view of trends related to vulnerabilities and, more importantly, how many Microsoft vulnerabilities could be mitigated if admin rights were removed from organizations. This is the 7th annual edition of the Microsoft Vulnerabilities Report, and includes a five-year trend comparison, giving you a better understanding of how vulnerabilities are growing and in which specific products.

  • The 12 Essential Tasks of Active Directory Domain Services

    Learn how you can reduce AD workloads through the implementation of proper management, automation and administration tools.

  • 10 steps to cleaning up Active Directory user accounts — and keeping them that way

    In this document, I provide 10 steps that you can take to remediate user account problems in AD and to prevent them from occurring in the future. These steps use native AD features and common workflow technology such as Microsoft SharePoint, so no significant prerequisites will hinder your ability to implement my recommendations.

  • The top five ways to relieve the pain of managing hybrid AD environments

    Managing Active Directory can be painful. Native tools have limited capabilities, which leads to inefficiencies, such as managing user accounts or group membership via manual processes or scripts. To make things even more interesting, Microsoft has introduced Azure Active Directory (AAD). It's a cloud-based directory that is required for access to the next-generation of services, including Office 365 and other cloud resources.

  • Top Seven Reports for Supporting a Growing Virtual Workforce

    IT environments are more dynamic than ever, and having more users working from home introduces new vulnerabilities. You undoubtedly want to take full advantage of the tools you already have to strengthen Office 365 security and compliance — but you probably just don’t have the time to go digging through them to find what you need.

  • Hacking Active Directory - Security Lessons from a Penetration Tester

    Globally, more than 95 percent of Fortune 1000 companies rely on Active Directory (AD) for authentication and single-sign-on support for their user populations. As it is nearly everywhere – in every company, organization and government agency – this makes AD a primary target for attackers looking to steal your intellectual property, your customer data or to hold your data for ransom.

  • Merger & Acquisition IT Integration Checklist: Active Directory

    If your organization is involved in a merger and acquisition, the impending IT integration project might seem overwhelming. But it needn’t be. In fact, the project can be the perfect opportunity to clean up, consolidate and modernize your Microsoft IT infrastructure to meet the business requirements you’re facing anyway.

  • Top 10 Active Directory Security Reports and Alerts You Need

    Check out this white paper to discover the top 10 reports and alerts you need to ensure the stability and security of your on-prem or hybrid Active Directory, and see how easily you can get them with Change Auditor.

  • Effective License Management with a Changing Remote Workforce

    Office 365 and Azure AD licenses often consume the biggest chunk of IT budgets. Are you paying more — maybe a lot more — than you need to?

  • The Definitive Guide to SharePoint Migration Planning

    The most important part of any migration is the preparation — plan properly before you migrate anything, and not only will your migration go more smoothly, but you will have a healthier target environment going forward, which will reduce risk as well as support and maintenance costs.

  • Preparing for Attacks that Seek Total Annihilation

    Defending your IT infrastructure against attack has never been a simple task. But things have taken a decidedly ugly turn of late: More and more attacks are simply seeking the total annihilation of your infrastructure. Any organization can be a target - or simply collateral damage from an attack targeting someone else.

  • Unfollow? What Moving Away from Social Media Advertising Means for Your Business

    Facebook, and its affiliates, is ususally a marketing investment “must” for companies both large and small. It provides targeted, efficient reach coupled with performance and has an endless pool of inventory (with 1.68 billion users), depth of targeting data, and their proprietary algorithms drive traffic and conversions. However, things have recently taken an unexpected turn.

  • Red Hat Advanced Cluster Management for Kubernetes

    Learn how Red Hat Advanced Cluster Management for Kubernetes reduces the complexity of multicluster management with end-to-end visibility and control.

  • Ransomware Resiliency Strategies

    Ransomware is here to stay. As much as we don’t like to hear that, we have to admit that it’s no longer a question of "if," but “when” and “to what extent” your business might be affected. Rather than just hoping it won’t affect you, explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. Today’s backup technologies can offer in-flight malware checks, immutable backups, and more!

  • 3 Reasons to Choose Managed Detection and Response

    Cyber threats affect data security in all organizations, but organizations in highly regulated industries such asfinancial services, healthcare, and the public sector face a particularly severe onslaught because of the sensitive data they collect and manage. How can organizations like yours effectively address these threats? Three areas of operations deserve particular attention