Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Enable Consumption-based Data Management with HPE and Veeam

    One of the biggest data protection challenge is the economic unpredictability of finding the right solution that can support exponential data growth while remaining cost effective. HPE and Veeam offer the Veeam Availability Platform through HPE’s GreenLake Flex Capacity consumption-based IT procurement model. Learn more.

  • How to Meet the Data Protection Challenges of the All-Flash Data Center

    A transformation is underway in data centers around the globe as organizations transition from legacy storage solutions to all-flash storage arrays. All-flash provides significant benefits for businesses, such as greater capacity, scalability and predictable high performance. But the move to all-flash data centers does not come without some challenges and an element of increased risk of data loss. Learn more.

  • Top 5 Backup and DRaaS Considerations

    Read this white paper and learn about Top 5 factors to consider in choosing the right cloud backup and DRaaS solution in order to reduce IT complexity, lower costs and ensure agility, availability and business acceleration. Learn more.

  • Getting Prepared for the Microsoft Azure Administrator Certification Exam

    Many organizations are transitioning to Microsoft Office 365 and utilizing public clouds such as Microsoft Azure. However, IT leaders are discovering that default data protection schemes are not as robust as they desire. In this IDC research paper, you'll learn key benefits customers gained from using Veeam with Microsoft Cloud solutions. Learn more!

  • Powershell 6.2 Tutorial for Beginners

    In this white paper, we're going to cover how to get started with PowerShell v6.2 (specifically on Windows) and how it can be applied to an IT pro's daily life to get back her much-needed time. Fortunately, with a tool called PowerShell at their disposal, IT pros can automate tasks, potentially reducing the time they spend on these tasks by hundreds of hours a year. Learn more.

  • Top 10 Best Practices for vSphere Backups

    The “Top 10 Best Practices for vSphere Backups” white paper discusses best practices with Veeam Backup & Replication™ and VMware vSphere, such as planning your data restore in advance and keeping track of your data backup software updates and keeping your backup tools up-to-date. Learn more.

  • Backup ROI for Dummies

    Why wait until something fails, breaks, is overwritten or corrupted accidentally/on purpose? Help your teams learn to quantify the full business impact of downtime and data loss, so that an informed decision is made for your data protection. Learn more.

  • Nine Best Practices for Active Directory Security

    Microsoft Active Directory (AD) is a prime target for attackers because of its importance in authentication and authorization for all users. This ebook explores how a typical insider threat unfolds and details nine critical security best practices that minimize the risk of the internal threat to the availability, confidentiality and integrity of AD.

  • Office 365 Tenant Hacks: The Ultimate Guide to Post Migration Setup

    Read this Fireside Chat paper to learn what you can do to make sure your Office 365 migration goes smoothly by being prepared for ongoing Microsoft updates, efficiently handling licenses, and securing cloud data.

  • Digital Dialogue: Cloud Ready Data Protection for Hybrid Data Centers

    Read this Digital Dialogue to find out what you can do to secure hybrid data centers and achieve regulatory compliance with one suite of tools providing consistent management and operations.

  • Hyperconverged Infrastructure 101: How to Get Started

    Business demands are shifting. The pace of technology is speeding up. The ability to deliver applications faster while building a solid cloud strategy is no longer a nice-to-have, but a must-have for modern businesses looking to stay competitive while meeting customer needs.

  • Data Center Modernization for Dummies

    How can a software-defined data center help your company gain a bigger competitive advantage? To help your business stay competitive, your IT organization needs a modern data center that can provide the agility, security, and scalability required to drive innovation and growth in the digital era. Get suggestions and tips for modernizing your data center in this For Dummies guide.

  • Hyperconverged Infrastructure for Dummies

    Maintaining an agile data center infrastructure tends to be a source of headaches for IT leaders and administrators. It doesn't have to be. Hyperconverged infrastructure (HCI) evolves the way that compute, storage, and management are delivered and provisioned to help you cut operational and capital costs, increase information technology (IT) and business agility, and improve application performance.

  • Conversational Ransomware Defense and Survival

    The 2018 updated edition of the Conversational Ransomware Defense and Survival e-book is designed to help you understand the ransomware threat and to protect yourself and your organization from potential attacks.

  • Microsoft Vulnerabilities Report 2019

    The 2017 Microsoft Vulnerabilities Report reviews the latest trends and reveals that the number of published vulnerabilities has risen by 111% over five years. The ever-popular report makes the compelling case for least privilege, finding that of the 235 Critical vulnerabilities reported in 2017, 80% would be mitigated by removing local admin rights from users.

  • Buyer’s Guide for Complete Privileged Access Management (PAM)

    The Buyer's Guide for Complete Privileged Access Management (PAM) is the most thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. This 39-page PAM Buyer's Guide will help you identify where to begin your privileged access management project, how to progress to a better IT security posture, and what business outcomes to expect.

  • Just-In-Time (JIT) Privileged Access Management (PAM)

    This white paper includes an overview of JIT privilege management, provides tips on a practical model for achieving it, outlines parameters to build your JIT policy, and offers a glossary of key concepts and terminology.

  • Privileged Access Threat Report 2019

    In this fourth edition of BeyondTrust’s annual Privileged Access Threat Report, we’ll be exploring the 2019 threat landscape in detail, with a focus on how security decision makers are utilizing Privileged Access Management (PAM) solutions to mitigate these risks.

  • Integrating Password and Privilege Management for Unix and Linux Systems

    When organizations stitch together sudo and other tools as part of a fragmented approach to manage Unix/Linux privileged access, it almost invariably results in dangerous security gaps and management limitations. This places those organizations at a serious disadvantage when facing modern attacks and motivated adversaries, as well as when trying to enable new technologies across the business.

  • Not all Office 365 providers are created equal

    Read this eBook to find out how to select a CSP that will actively engage with you to discover and resolve user adoption challenges and provide proactive guidance with a direct line to Microsoft engineers.