Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Physical Servers Backup with Veeam: Best Practices and Configuration

    Most organizations today rely on virtualized IT infrastructures. Veeam® helps them to provide and increase Availability of critical workloads running on their systems. Due to various factors, some physical servers cannot be virtualized, along with endpoints that might not be protectable in their entirety by leveraging back-up solutions built for virtualized systems.

  • Modernize Your Backups Today with Veeam

    As your business embarks on its journey to meet the backup challenges of today and tomorrow, Veeam® is ready to help you modernize your backups with key capabilities in Veeam Availability Suite™.

  • Microsoft Teams Backup - a Conversational Geek eBook

    Learn everything you need to know about protecting Teams data from this Conversational Geek e-book by Brien Posey, Microsoft MVP.

  • Office 365 Backup for Dummies

    Get this easy-to-read e-book For Dummies, and learn how to best backup and protect your Office 365 data. It’s you data, it’s your responsibility to protect it!

  • Why a Backup Strategy for Office 365 is Essential

    This short, easy-to-read research paper by IDC provides their view on why having a backup of Office 365 data is essential.

  • 7 Critical Reasons for Office 365 Backup

    You have one more reason added to the 6 critical reasons to protect your Office 365 data. This 5-minute read document helps you convince your managers and peers that your organization needs Office 365 data protection.

  • Privileged Access Management (PAM) Buyer’s Guide and Checklist

    Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organization’s most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an “insider”.

  • IT Strategy Guide to Building a Just-In-Time (JIT) Privileged Access Management (PAM) Model

    This white paper includes an overview of JIT privilege management, provides tips on a practical model for achieving it, outlines parameters to build your JIT policy, and offers a glossary of key concepts and terminology.

  • Enable & Secure Your Remote Workforce

    IT departments are under incredible pressure to maintain the business productivity for an expanded remote workforce that may already be exponentially larger than it was just a few weeks ago. As many IT teams work overtime to enable remote workers, the risks of not maintaining security practices are also top of mind, with the acute awareness that threat actors are actively seeking opportunities to benefit from current circumstances.

  • Optimize your Endpoint Security Strategy - The Critical Steps

    Endpoint security is an ecosystem--not a single solution. Endpoint security has evolved considerably over the last decade as workforces and assets have become more distributed, environments have increasingly moved to the cloud, and the number and types of endpoints has exploded.

  • Universal Privilege Management: The Journey to Securing Every Privilege, Every Time

    The Universal Privilege Management model secures every user, session, and asset across your IT environment. With the BeyondTrust approach, you can start anywhere, with the privileged access management (PAM) use cases that are most urgent to your organization, and then seamlessly address remaining use cases over time.

  • Microsoft Vulnerabilities Report 2020

    The BeyondTrust Microsoft Vulnerabilities Report, produced annually, analyzes the data from security bulletins issued by Microsoft throughout the previous year. Every Tuesday, Microsoft releases fixes for all vulnerabilities affecting Microsoft products, and this report compiles these releases into a year-long overview, creating a holistic view of trends related to vulnerabilities and, more importantly, how many Microsoft vulnerabilities could be mitigated if admin rights were removed from organizations. This is the 7th annual edition of the Microsoft Vulnerabilities Report, and includes a five-year trend comparison, giving you a better understanding of how vulnerabilities are growing and in which specific products.

  • The 12 Essential Tasks of Active Directory Domain Services

    Learn how you can reduce AD workloads through the implementation of proper management, automation and administration tools.

  • 10 steps to cleaning up Active Directory user accounts — and keeping them that way

    In this document, I provide 10 steps that you can take to remediate user account problems in AD and to prevent them from occurring in the future. These steps use native AD features and common workflow technology such as Microsoft SharePoint, so no significant prerequisites will hinder your ability to implement my recommendations.

  • The top five ways to relieve the pain of managing hybrid AD environments

    Managing Active Directory can be painful. Native tools have limited capabilities, which leads to inefficiencies, such as managing user accounts or group membership via manual processes or scripts. To make things even more interesting, Microsoft has introduced Azure Active Directory (AAD). It's a cloud-based directory that is required for access to the next-generation of services, including Office 365 and other cloud resources.

  • Top Seven Reports for Supporting a Growing Virtual Workforce

    IT environments are more dynamic than ever, and having more users working from home introduces new vulnerabilities. You undoubtedly want to take full advantage of the tools you already have to strengthen Office 365 security and compliance — but you probably just don’t have the time to go digging through them to find what you need.

  • Hacking Active Directory - Security Lessons from a Penetration Tester

    Globally, more than 95 percent of Fortune 1000 companies rely on Active Directory (AD) for authentication and single-sign-on support for their user populations. As it is nearly everywhere – in every company, organization and government agency – this makes AD a primary target for attackers looking to steal your intellectual property, your customer data or to hold your data for ransom.

  • Merger & Acquisition IT Integration Checklist: Active Directory

    If your organization is involved in a merger and acquisition, the impending IT integration project might seem overwhelming. But it needn’t be. In fact, the project can be the perfect opportunity to clean up, consolidate and modernize your Microsoft IT infrastructure to meet the business requirements you’re facing anyway.

  • Top 10 Active Directory Security Reports and Alerts You Need

    Check out this white paper to discover the top 10 reports and alerts you need to ensure the stability and security of your on-prem or hybrid Active Directory, and see how easily you can get them with Change Auditor.

  • Effective License Management with a Changing Remote Workforce

    Office 365 and Azure AD licenses often consume the biggest chunk of IT budgets. Are you paying more — maybe a lot more — than you need to?