Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Troubleshooting Microsoft 365 End-to-End: Turning Interruption into Insight

    You need Microsoft 365 not just running, but running well. Read this eBook, by Microsoft MVP Nick Cavalancia, and find out how to create actionable Microsoft 365 insight through user experience and service monitoring.

  • Ransomware Resiliency Strategies

    Ransomware is here to stay. As much as we don’t like to hear that, we have to admit that it’s no longer a question of "if," but “when” and “to what extent” your business might be affected. Rather than just hoping it won’t affect you, explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. Today’s backup technologies can offer in-flight malware checks, immutable backups, and more!

  • Ransomware: Past, present, and future

    Every 14 seconds, somewhere around the globe, a business falls victim to a ransomware attack. What is ransomware, and why does it increasingly keep IT professionals awake at night?

  • College of Southern Nevada - Getting Out of the Cybersecurity Business Is the Smartest Decision a CISO Can Make

    With an estimated 3.5 million cybersecurity positions going unfilled by 2021, according to recent research from Cybersecurity Ventures, it’s near impossible to hire and retain the experts needed to keep up with increasingly sophisticated cybersecurity threats 24x7. This leaves many organizations desperately trying to ward off threats with a patchwork of DIY solutions that all fall short. In 2019, the College of Southern Nevada (CSN), a public college with 37,000+ students on multiple campuses, found itself in a dilemma.

  • Tackling Content Sprawl with Governance Designed to Support Remote Work

    Since consolidating its files onto Egnyte, BW, a workplace specialist company, has reduced IT complexity and risk by moving off of three different file storage and sharing solutions including SharePoint, Dropbox, and an on-premise Windows File Server. This has provided BW’s users with the performance they need to work productively from any location and enabled IT to control content sprawl across the business.

  • Data Governance Trends: Predictions, pitfalls, and technologies for the future of digital work

    The inaugural Data Governance Trends Report is based on survey results from 400 CIOs and IT leaders across industries, highlighting challenges associated with the data type most greatly affected by remote working scenarios: unstructured data (Unstructured data includes all the information stored in files like Excel, Word and PowerPoint documents, as well as images, video and more).

  • What is the problem that Azure Security Center is trying to solve?

    Azure Security Center gives you enhanced visibility and increased control over your Azure resources by helping you to prevent, detect, and respond to threats. With integrated security monitoring, policy management and implementation across your subscriptions resources. ASC will help you close the gaps that could be otherwise hard to find and protect your cloud-based environment with ease.

  • 3 Reasons to Choose Managed Detection and Response

    Cyber threats affect data security in all organizations, but organizations in highly regulated industries such as financial services, healthcare, and the public sector face a particularly severe onslaught because of the sensitive data they collect and manage. How can organizations like yours effectively address these threats? Three areas of operations deserve particular attention.

  • Get Only Alerts That Matter

    Security leaders face a new normal. Today’s motivated attackers will probe your attack surface until they find a way past even the best controls. Then what?

  • The Future Is Here Today for Network & Security

    From the days of mainframes and terminals, through connected personal computers, local area networks (LANs), and wide area networks (WANs) to client-server, peer-to-peer, and the internet, the specifics of networking have changed time and again. Technical developments and new needs have pushed each other along.

  • Red Hat OpenShift and Kubernetes ...what's the difference?

    Learn how Red Hat OpenShift helps organizations transition to containers and Kubernetes and realize the full potential of a hybrid cloud strategy.

  • Data-intensive intelligent applications in a hybrid cloud blueprint

    Learn the stages of the data-intensive intelligent application life cycle and how Red Hat can help you build, maintain, and manage these applications.

  • Agile integration: A blueprint for enterprise architecture

    Learn how agile integration provides a framework, both technical and organizational, to help reshape IT infrastructure.

  • Best practices for migrating to containerized applications

    Learn specific, technical recommendations and guidelines for migrating software into containers—from image build procedures to production best practices.

  • O’Reilly: Kubernetes Operators: Automating the Container Orchestration Platform

    This O’Reilly e-book explains how to build Kubernetes Operators using SDK and the Operator Framework. Learn how Operators are used to automate the app life-cycle.

  • O’Reilly: Kubernetes patterns for designing cloud-native apps

    O’Reilly provides reusable Kubernetes patterns so containers can improve rapid app development. Learn how to use Kubernetes to support cloud-native app development.

  • Five Ways to Reduce the Cost and Complexity of File Sharing

    IT’s role today is to innovate and enable productivity for the business. When it comes to file sharing, that means a modern platform supporting secure, anywhere access to files from any device with a user-friendly platform so your workers can collaborate without compromise.

  • How Preqin Gained Control over 9 Trillion Data Points and Decreased Costs

    The sophisticated discovery and reporting tools within Egnyte not only demonstrate Preqin’s compliance with multiple regional, national and state data protection laws, but they also make it easier to stay on the right side of clients. For example, since GDPR came into force, the company has received over 270 subject access requests. Before the Egnyte deployment, each request would take up to three weeks to complete. Using Egnyte to discover all relevant data, requests can be completed within a matter of days.

  • Managing Sprawl in Microsoft 365

    SharePoint expert Christian Buckley - on the essential skills every IT department must master to control sprawl in Microsoft 365 environments.

  • 2020 Data Protection Trends

    Veeam and phoenixNAP bring you an insight into the IT challenges, strategies, and goals of more than 1,550 enterprises worldwide to help understand IT modernization trends and data protection best practices. Download it today to learn how they expect to be prepared for the IT challenges they face, including reacting to demand changes and interruptions in service, as well as more aspirational goals of IT modernization and Digital Transformation.