Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Remedying the Email Security Gaps in Microsoft Office 365

    Why should you consider additional security protection around Microsoft Office 365 email use? And, what should you look for in a third-party solution? Read this paper and find out more!

  • No Kidnapping, No Ransom

    Ransomware is still one of the most lucrative weapons in a cybercriminal’s arsenal. This kind of cybercrime encrypts the files on a computer, and blocks access to them until the required ransom is received, generally in the form of bitcoin, an untraceable virtual cryptocurrency. Learn more.

  • The Practical Security Guide To Prevent Cyber Extortion

    Cyber extortion is a form of blackmail in which victims of an IT attack are forced to pay to avoid its effects. The most common type of cyber extortion is ransomware, which is so popular among cybercriminals that it’s become a billion-dollar industry. Learn more.

  • Understanding Cyber-Attacks

    The frequency, sophistication and targeted nature of cyber-attacks has drastically changed the threat landscape. While most organizations have the means to detect known threats, although few of these types of attacks still occur, many still need to evolve their security practices to include detection of unknown attacks. Learn more.

  • The Hotel Hijackers

    From booking a room to the payments made at shops and restaurants, hotel chains have complex networks that save enormous amounts of sensitive and private data, just waiting to be compromised. This makes the hospitality industry one of the main targets for cybercriminal activity. Learn more.

  • Are You Ready For Your Fully-Funded Azure® Total Economic Assessment with Fujitsu?

    Whether you're an IT pro or CFP, you've heard Azure is the powerhouse cloud platform, preferred by 90% of Fortune 500 companies. It's within your reach with this unique opportunity from Microsoft and Fujitsu to receive your fully-funded, 6-week assessment of your cloud readiness. Read more!

  • A Get Fit eBook: Peak Performance: How Your I.T. Network Can Get There.

    Read this eBook, to review common areas of strength—and opportunity—so you can develop a plan to take your organization’s IT to the next level by answering five key questions.

  • How a Center of Excellence Drives User Adoption and Value for Office 365

    Every company is, or will soon be, operating like a digital company, re-engineering operations to support the new speed of business. If you’ve invested in Office 365, you have the capability to execute a digital transformation. However, enabling and sustaining that capability can be challenging. Learn more.

  • How to Simplify Your Migration to Windows 10

    Read this paper to learn about an AWS cloud-based tool that can provide IT with a way to automate migrations, upgrades and data backup without any disruption for the end user. Learn more.

  • Top Three Ways Departing Employees Steal Your Data

    Why do people take a risk and steal from their employers? How exactly does data theft play out based on different motivations? Discover top three threats that insiders pose to your data to protect it. Learn more.

  • Five Methods to Optimize and Reduce Office 365 Licensing Costs

    Office 365 licenses are incredibly diverse in both function and price. With a smart license strategy and a few tips, your organization can optimize license usage and minimize costs while simplifying day-to-day license administration. Learn more.

  • Office 365 - Why Email is the #1 Vulnerability

    Everybody loves the productivity of Office 365, but more organizations are expressing concerns about its security. Stop Phishing, Continuity and Archiving issues and get more from your O365 investment! Learn more.

  • Simplify Security - Keeping Your Business Email Safe with modusCloud

    Credential Phishing, Ransomware, Business Email Compromise, Email Fraud… these are all risks every modern business faces. Learn how their simple tactics can be stopped with the right solution. Learn more.

  • Forrester Total Economic Impact Study

    Read this study for an in-depth explanation of Forrester’s analysis and a detailed walk-through of KnowBe4's impact on our customer’s business. The resulting research paper assesses the performance of the KnowBe4 Platform. How does 127% ROI with a one month payback sound? Learn more.

  • Top Eight Identity and Access Management Challenges with Your SaaS Applications

    The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. Learn more.

  • Best Practices for Protecting Against Phishing, Ransomware, and Email Fraud

    This new Osterman Research paper outlines ten best practices to consider that show how a combination of risk assessment and audits of your current security posture, implementing end-user security awareness training, and establishing detailed security policies can protect your organization from ransomware, CEO Fraud and other phishing attacks. Learn more.

  • The 2018 Ransomware Hostage Rescue Manual

    Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention Checklist. Learn more.

  • How To Transform Employee Worst Practices into Enterprise Best Practices

    The bad guys are just one gullible user click away from staging an all-out invasion on your network. Get clear direction on how to go about improving your organization’s security posture against social engineering attacks. Learn more.

  • The 2018 Threat Impact and Endpoint Protection Report

    Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter. Despite the many security offerings available, organizations continue to fall victim to ransomware attacks. Learn more.

  • CEO Fraud Prevention Manual

    CEO fraud is responsible for over $3 billion in losses. Don’t be next. The CEO Fraud Prevention Manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim. Learn more.