Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Four Pillars For a Modern DDOS Protection Strategy

    Read this paper to learn about the four pillars of a modern DDoS protection strategy including surgical precision to protect legitimate users, scalability to combat modern threats, automation to improve efficiency, and affordability to maximize your budget. Learn more.

  • IDG Report: DDoS: Strategies for Dealing with a Growing Threat

    This report summarizes recent research on distributed denial of service (DDoS) attacks, which looks at data collated recently and compares some of this data to a similar study conducted in 2015. Learn more.

  • Affordable Enterprise-Grade Disaster Recovery Using Google Cloud Platform

    Leveraging GCP with a cloud-based disaster recovery solution allows organizations to achieve enterprise-grade DR capabilities at a fraction of the cost. This white paper explains how your company can benefit. Learn more.

  • Disaster Recovery Testing, Your Excuses, and How to Win

    Are you 100% confident you can recover? In this paper, discover testing standards, common objections, and the newest technologies enabling effortless, zero resource daily testing. Learn more.

  • Windows 10 Migration: More than Just an O/S Migration

    Read this Fireside Chat paper to learn how Lenovo and Microsoft are working together to make Windows 10 a difference maker with state-of-the-art features including multi-factor hardware-based authentication for security. Learn more.

  • IT Asset Management: Evolving Past the Spreadsheet of Machines

    Read this Digital Dialogue to find out what to do to move IT asset management out of the spreadsheet era with a solution that provides device count, location, ownership, automated deployments, patching and remediation. Read on for details.

  • Workplace Transformation

    Read this Fireside Chat paper to find out how hardware and software is evolving to support provisioning of Huddle Rooms to provide lower hardware costs with all-in-one audio, video and computing. Learn more.

  • Nutanix InstantOn for Citrix Cloud

    Read this Solution Brief to learn about technology that simplifies and accelerates virtual application and desktop (VDI) deployments by providing high performance, a better user experience, and faster turnkey deployment. Learn more.

  • A New Approach to Improving Application Responsiveness

    How quickly does your organization react to changing customer expectations? Slow application response can be critical to meet or fail those expectations. This eBook explains a new approach to eliminate I/O bottlenecks and solve today’s application performance problems. Learn more.

  • Five Steps to GDPR Success

    Read this Fireside Chat paper to learn the steps for dealing with the GDPR including discovering all the places GDPR impacted data is stored and making sure data is secure. Read more.

  • The Time For IT Resilience Is NOW

    Read this paper to learn about solutions that provide seamless, automated access to your applications and data to provide IT Resilience & Assurance (ITRA) including early warning technology for ransomware and other malicious activity. Read more.

  • ITRA Man

    View this infographic featuring a mythical IT Resilience & Assurance Man (ITRA Man for short) who comprises all the key skills and attributes necessary to deliver a world class ITRA solution. Read more.

  • The Top 6 Considerations For IT Resilience & Assurance

    Read this paper to learn how IT Resilience & Assurance (ITRA) incorporates early detection of pending impact caused by mistakes, malicious activity or Mother Nature, and provides rapid recovery in the event of a failure. Read more.

  • The Evolution of IT Resilience & Assurance

    Read this paper to learn why the move to IT Resilience & Assurance (ITRA) is necessary to provide early warning of malicious activity, automatic mitigation of damage, and recovery of your business operations. Read more.

  • Protecting Exchange Online Mailboxes from Spam and Phishing Attacks

    Read this paper on email protection including the use of Exchange Online Protection (EOP) to learn about third-party anti-virus solutions for Exchange Online and steps that will to ensure that your mailboxes are protected. Read more.

  • DataCore MaxParallel Software for SQL Server: Making Latency-Sensitive OLTP and Analytics More Responsive and Productive

    In this Technology Brief, IDC discusses the importance of boosting SQL Server database performance to make key business applications more responsive, productive, and affordable. It assesses how solutions such as DataCore MaxParallel software are addressing application performance challenges. Learn more.

  • Solving Performance Bottlenecks in Servers: A Deep Dive

    This technical whitepaper reveals how DataCore eliminates sluggish I/O performance in the host with MaxParallel™ software - leveraging the full potential of your CPUs and memory to yield more responsive applications and optimal use of your resources. Learn more.

  • Evolution of Threat Detection Technologies

    Concerned about memory mods and fileless malware? CounterTack’s Digital DNA is the only real-time, in-memory analysis technology that scans running processes to predict and detect malicious behaviors.

  • Microsoft Azure and Commvault Datasheet

    In this paper you will learn the top reasons why customers chose Commvault software for Azure products and technologies. Learn more.

  • Disaster Recovery Planning for Today's Real World Outages

    Choosing the right disaster recovery solution can be the difference between keeping your business up and running or going dark during an emergency. Learn how the Commvault platform for data management provides availability for your business against today’s real world outages.