Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Business Disaster Recovery Strategies

    This paper will help you prepare for outages in your infrastructure by sharing disaster recovery (DR) strategies. Often, DR outages are not a complete outage, so being prepared with granularity in your DR strategies gives you flexibility. Learn more.

  • Advanced Data Protection Using Veeam and NetApp Technology

    Learn how organizations can attain RTPOs of <15 minutes for all applications and data while improving business speed when NetApp storage is combined with Veeam. Register now.

  • The Phishing Breakthrough Point

    Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots. Learn more.

  • Your Money or Your Life Files! A Short History of Ransomware

    This white paper provides a history of ransomware and what you can do to prevent being attacked. Learn more.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Phishing and malware threats are skyrocketing as cybercriminals become more adept, stealthier and more able to penetrate your IT security defenses. The consequences of even a single attack penetrating your network can be devastating, resulting in enormous potential losses. Learn more.

  • Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

    For the second year in a row, leading IT analyst firm Enterprise Management Associates (EMA), has delved into the world of security awareness and policy training. Their latest research on this topic revealed that a tremendous shift in awareness training programs has taken place, especially in small and medium businesses. Learn more.

  • Get Your Ransomware Hostage Rescue Manual

    Being in IT I’m sure you know someone who’s been hit with ransomware or you have been through it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent it in the future? Now you do! Learn more.

  • 7 Cloud Security Best Practices for Amazon Web Services

    If you’re getting ready to move your data to Amazon Web Services or already have, here are seven best practices for AWS we recommend getting the most out of your cloud security. Learn more!