Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Enterprise Automation Checklist In A DevOps World

    Learn practical steps and best practices for enterprise network automation implementation.

  • Ansible Windows Checklist

    This checklist outlines 10 ways to automate Microsoft Windows using Red Hat Ansible Automation Platform, using the same management tools for automating Linux environments.

  • The Automated Enterprise e- book

    Learn how to use automation for infrastructure, network, and other critical IT services. See how platforms like Red Hat Ansible work to transform IT.

  • 5 steps to automate your business

    Learn how Red Hat Consulting can put your organization on the path to enterprise-wide automation— no matter your starting point—with these 5 steps.

  • Microsoft automates to achieve more with Red Hat Ansible Automation Platform

    See how Microsoft worked with strategic partner Red Hat to build a collaborative, efficient approach to IT automation with DevOps and Ansible.

  • Top Seven Reports for Supporting a Growing Virtual Workforce

    IT environments are more dynamic than ever, and having more users working from home introduces new vulnerabilities. You undoubtedly want to take full advantage of the tools you already have to strengthen Office 365 security and compliance — but you probably just don’t have the time to go digging through them to find what you need. Good news: With Quest Enterprise Reporter, you don’t have to! We’ve gone through all of its 100+ prebuilt reports and hand-picked the top seven that will be most helpful to you right now, as your remote workforce is growing and changing rapidly. Simply download this ebook to learn how Enterprise Reporter will help you.

  • COVID-19 Active Directory Vulnerabilities and Attacks that Seek Total Annihilation

    Download this tech brief to learn how destructive incidents unfold, how to defend your organization, and where to find the powerful yet flexible disaster recovery solutions that you need today more than ever.

  • 6 On-Prem Security Myths Debunked

    In this whitepaper, we’ll explore common misconceptions surrounding on-prem access management and provide ways to improve your security posture in a hybrid environment.

  • eBook: Bringing Modern Access to Traditional On-Prem Apps

    A guide to deploying modern identity for hybrid environments. This guide walks through the drivers, considerations, solutions, phases, and best practices for modernizing identity and access management with Okta.

  • Economic Impact: Veeam Cloud Data Management

    TEI Report: Reduce operating costs of data backup and recovery while reducing data-related risk.

  • 2020 Modern Backup Buyers’ Guide

    Checklist for your Cloud Data Management project. This Forrester guide provides directions into what capabilities to look for and offers questions that IT decision makers should ask themselves and their team as they evaluate their company’s specific data needs.

  • 2020 Data Protection Trends

    Insights to key data challenges from business and IT leaders. Veeam® surveyed over 1,500 business and IT leaders on their data management challenges and successes, from data protection to staffing challenges to business continuity concerns and costs.

  • CEO Fraud Manual

    Over the last three years, CEO fraud has been responsible for more than $26 billion in losses. Despite these losses, CEO fraud remains a blind spot for many C-level executives who quickly learn the consequences of a weak cyber-risk assessment. Part I explains how top executives in finance are hoodwinked, how organizations are compromised, how millions are siphoned off by criminals, and how fiduciary responsibilities play a role. Part II covers how to prevent this type of attack and what to do if you become the latest victim.

  • Ransomware Hostage Rescue Manual (New 2020 Edition)

    The New 2020 Edition of this Ransomware Manual is packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware. You will also receive a Ransomware Attack Response Checklist and Ransomware Prevention Checklist.

  • Phishing by Industry 2020 Benchmarking Report

    IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

  • Comparing DaaS Solutions

    IT departments all over are looking for new ways to build a reliable, secure, and efficient desktop virtualization foundation to keep up with growing cybersecurity threats, expanding BYOD and increases in remote workers. But traditional, on premises VDI deployments aren’t the only option anymore. Use this guide to learn more about hosted virtual desktops and desktop-as-a-service technology – and learn what questions you should be asking when deliberating between virtual desktop choices.

  • The Future is Now: Creating an Intelligent Cloud Contact Center to Deliver Exceptional Experiences

    Today’s organizations compete on customer experience and this trend will define the shape and scope of contact centers well into the next decade. To deliver the level of seamless experiences that customers expect, contact centers will need to harness all the advantages technology can offer – specifically, the cloud – to create an “intelligent cloud contact center” that utilizes machine learning and real-time data analysis. In this paper you will learn three steps you need to transition to an intelligent cloud contact center.

  • 5 Ways to Empower Remote Agents to Deliver Great Customer Experiences

    Customer experience drives the success of your organization. Awesome systems for onboarding customers and supporting them can certainly establish an initial relationship, but what happens when something goes wrong or the systems in place get in the way of helping the customer? In this paper, we’ll explore five ways to help you empower your remote agent workforce.

  • Using Zero Trust To Kill The Employee Password

    This report compares authentication methods in use in today's organizations and offers steps to help S&R pros ditch the password for good and adopt a Zero Trust approach to authentication.

  • Businesses @ Work (from Home)

    This mid-year update to Businesses @ Work looks at the data from the Okta Integration Network (OIN) to understand how organizations are employing new apps and increasing adoption of existing technology to improve productivity and secure their remote workforce during this unique crisis. Our network now includes nearly 8,000 customers and over 6,500 integrations with cloud, mobile and web apps, and IT infrastructure providers.