Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Capacity Management in the Modern Data Center

    Capacity management has existed since the advent of server-based computing, dating back to the age of the mainframe. Commercial tools have existed for over 30 years with each successive generation of server platform creating its own unique requirements. This white paper explores the traditional methods of capacity management, the new approach IT must adopt to stay competitive and how you can assure application performance while scaling your infrastructure.

  • The CIO Guide to Autonomic IT

    Organizations are adopting cloud computing to accelerate service delivery. Some try to deliver cloud economies of scale in their private data centers with the mantra “automate everything,” a philosophy often simpler in theory than practice. Others have opted to leverage public cloud resources for the added benefit of the pay-as-you-go model, but are finding it difficult to keep costs in check. Regardless of approach, cloud technology poses the same challenge IT has faced for decades: how to assure application performance while minimizing costs. Learn more.

  • The Path to Hybrid Cloud

    The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. With public cloud advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, When and Where do you run workloads to guarantee performance while maximizing the efficiency. Read now!

  • GameChanger Report: Why You Need to Up Your Game With Security for Office 365

    Many organizations have found Office 365’s built-in security capabilities to be inadequate. Read this Redmond GameChanger to learn about options for data loss prevention, archiving, and closing gaps in security.

  • Get Ahead of Your Windows 10 Migration

    Read this Digital Dialogue to learn about technology that can help you over Windows 10 migration hurdles with a three-step approach: detecting applications and user data, preparing endpoints, and eliminating data sprawl. Learn more.

  • New Clouds, Same Challenges - Public Cloud Guide

    When Amazon Web Services officially launched in 2006 it was fulfilling a growing need for self-service computing. The dot-com era had come and gone. A digital economy was growing out of the ashes. Today, a decade later, applications have become the lifeblood of the enterprise. With a mandate to build more and build faster, on-demand cloud computing has been a godsend to developers. Learn more.

  • Digital Dialogue: Kill the Print Server With Cloud-Based Printing

    Read this Digital Dialogue to learn how cloud-based IP printing delivers a host of pros while eliminating virtually all the cons found in other printing architectures by providing printer drivers directly to workstations via the Internet. Learn more read now!

  • Indications of Compromise - A Guide to Spotting and Preventing Malware Infection

    Ransomware can be devastating. Even if your users do everything right and don’t pay the ransom, it still takes time out of your day to restore systems and data to a safe state. In this white paper, Indications of Compromise, learn what you can do to safeguard against cyber attacks. Learn more read now!

  • 5 Steps to Take Backup from Good to Great

    MSPs and IT Professionals know the importance of backup - it saves you from losing data (and from losing clients). In this ebook, you will learn ways to supercharge any of your existing backup and recovery efforts. Learn more read now!

  • Unified Security Management (USM) vs. SIEM: a Technical Comparison

    Get a full overview of the changing security landscape, and more importantly insight into the rapidly changing SIEM category, and the reasons that have led to those changes. To offer a complete picture of the changes to SIEM technology, it is valuable for some to understand the context of the SIEM market and how (and why) AlienVault differentiates itself form the traditional approach. Learn more read now!

  • Beginner's Guide to Hybrid Cloud Security

    In this AlienVault Beginners Guide, you’ll learn about challenges that affect both cloud and hybrid cloud infrastructure environments, and the best methods for detecting and overcoming those challenges. Learn more read now!

  • How to Build a Security Operations Center (on a Budget)

    Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. Learn more read now!

  • Cisco HyperFlex Systems and Veeam

    Today’s business requires new levels of IT efficiency and infrastructure agility to meet user expectations and business demands. To overcome these challenges, Veeam® Availability Solutions offer unique integration with Cisco HyperFlex hyperconverged systems to come together to transform IT infrastructure with data protection that is easy to deploy, simple to manage and scales as fast as business needs change. Read on.

  • Texas Medical Association Frees Up $700,000 with Veeam and Cisco UCS S3260 to Focus on Initiatives Supporting Public Health

    "TMA’s vision is to improve the health of all Texans, so we use the time and money saved by Veeam and the S3260 to concentrate on ways technology can support our public health priorities, including reduced tobacco use,environmental hazards, obesity and mental health and substance use disorders." — Aaron Haley, Network Operations Director, Texas Medical Association

  • Veeam and Cisco UCS Are Better Together

    Once, virtualization centered on consolidation. It now centers on supporting data center modernization and is usually focused on improving reliability and performance. Those reliability and performance improvements in turn bring greater agility to the organizations’ business processes, which is the true hallmark of a modern software-defined data center. Read on.

  • How to Select the Right Web Application Firewall: 10 Key Requirements to Consider

    This guide provides an overview of the threats to web applications and items to consider when selecting a web application firewall. It also details minimum feature and functionality requirements, and provides an at-a-glance checklist for evaluating web application firewalls. Read on and learn more.

  • Forrester Report: The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Most security professionals still explain the value of data security to the business only in terms of risk reduction, cost reduction and regulatory compliance. Data Security today is so much more than cost reduction. Read this Forrester report to learn how Data Security today is, in fact, a driver of revenue and growth.

  • Top 10 Indicators of Data Abuse

    The threat from insiders is not a new phenomenon, but high-profile incidents have elevated enterprise focus on effective detection and mitigation of insider threats. Detecting insider threats is challenging because internal users have legitimate access to valuable information, making it difficult to discern between appropriate data access and a true insider threat incident. Read on and learn more.

  • Top 5 Database Security Threats

    Data breaches are a threat to every organization. Breach damage goes beyond the loss or disclosure of sensitive or confidential data; companies incur significant financial costs associated with remediation and multi-year legal liability claims. This paper details the top 5 security threats to help organizations take steps to protect their critical data assets. Read on and learn more.

  • Today’s File Security is So ’80s

    The complexity of managing enterprise-level file permissions makes it increasingly difficult for security teams to keep track of who has access to what. Using the Dynamic Peer Group Analysis machine learning algorithm, virtual working peer groups are automatically identified and suspicious files access by unauthorized users can be immediately detected.Read on and learn more.