Tech Library

Download free white papers, e-books, technical reports, infographics, and other useful resources from Redmond Magazine's experts and our vendors. Also see our Free Webcasts.

Free White Papers Sponsor Index

  • Managing Sprawl in Microsoft 365

    The goal of this whitepaper is to help you better identify where content sprawl may be happening inside of your organization, and provide some community-hardened best practices for building your governance strategy.

  • Microsoft 365 Security Control Checklist

    Microsoft 365, as a service, contains many features that focus on security. Each service uses Azure Active Directory for authentication and authorization to access either the app itself or the content that resides within it. Organization-specific security controls and procedures should augment all out-of-the-box configurations. Remember that security within Microsoft 365 is not just about enabling features and controls; it also involves teaching and guiding end-users to understand the restrictions and knowing how to use them.

  • Microsoft 365 & Data Management

    This report explores the hazards of not having an Microsoft 365 backup in your arsenal, and why backup solutions for Microsoft 365 fill the gap of long-term retention and data protection.

  • #1 Microsoft 365 Backup Guide by Veeam

    Read this #1 Microsoft 365 Backup Guide by Veeam and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft 365 — from the early planning stage all the way to performing restores.

  • 100 Pipeline Plays: The Modern Sales Playbook

    Modern business moves at an incredible pace. New technologies and competitors, an increasingly global economy, and constant social disruptions are forcing fundamental change so quickly that it's nearly impossible to keep up. But the right tools can help.

  • Understanding Conversational Marketing

    Conversations have always been at the heart of our most authentic relationships. Whether it’s a business deal or a personal connection, conversations are a driving force that solidify a foundation of trust. Enter conversational marketing — the new paradigm for tackling business deals and converting prospects in minutes.

  • Buyer's Guide: 5 Essential Features of a Prospecting Solution

    Using ZoomInfo’s field surveys and exclusive research, third-party industry studies, and analyst briefs, this report aims to help B2B sales leaders understand: How prospecting solutions help maximize sales productivity...

  • The Impact of Direct Dials on Sales Productivity

    Leveraging the latest industry research, this eBook highlights the impact of direct dial phone numbers on sales productivity with the goal of empowering reps to have more conversations with prospects, and consequently, schedule more meetings, increase opportunities, and close more business -- fast.

  • Cold Calling Tips & Tricks

    The cold call still works. If you’re looking to perfect your cold calling techniques, download ZoomInfo’s latest eBook for a number of cold calling tips to help generate more leads to fuel your funnel.

  • 2020 Database Strategies and Contact Acquisition Survey Report

    This report aims to highlight the current state of B2B database and contact acquisition strategies and organizations’ goals to leverage data to fuel their go-to-market strategies in 2020 and beyond.

  • Buyer's Guide: Best Practices for Marketing Database Cleanse

    Download ZoomInfo’s latest data-driven eBook aimed to help marketing leaders understand the best practices around when it comes to choosing a B2B contact data provider.

  • 3 Mistakes Organizations Make While Developing ABM Programs

    Download ZoomInfo’s latest eBook to learn about the three most common mistakes organizations make while executing an ABM program.

  • 8 Truths and Tips: Protecting Azure Active Directory and Hybrid AD

    The threat of malicious attacks on Active Directory is on the rise and you must be prepared. Learn from Microsoft MVP, Brien Posey, key concepts to help you plan for and recover from inevitable cyberattacks.

  • 6 Ways to Optimize and Reduce Microsoft 365 Licensing Costs

    Microsoft provides dozens of license options for Office 365, but this added flexibility can bring additional challenges. Read this whitepaper to learn ways to get the most out of your Microsoft investment. Download now!

  • Traditional Pentesting - A Turtle Chasing a Cheetah

    Why Pentesting Needs to Evolve - Antiquated legacy penetration testing methods fail to catch all the critical vulnerabilities that exist within a company’s environment, which puts organizations at risk. Security teams are moving away from traditional pen testing methods to more innovative and continuous solutions. Learn more about the challenges and deficiencies of traditional pentesting.

  • CEO Fraud Prevention Manual

    CEO fraud is responsible for over $26 billion in losses. Don’t be the next victim. The CEO Fraud Prevention Manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.

  • Security Culture Maturity Model

    Download the industry’s first maturity model specifically geared to measure security culture to visualize your current level of security culture and plan the steps required to progress from one level to the next.

  • Building a Security Awareness Program to Help Defend Against Cyber Extortion and Ransomware

    Download this whitepaper for actionable advice on building a security awareness program focused on preparing your workforce to understand, recognize and defend against cyber extortionists and ransomware.

  • Forrester TEI Report

    Read this commissioned Total Economic Impact™ study for an in-depth look at Forrester Consulting’s analysis and detailed walk-through of KnowBe4's impact on a global enterprise customer. The resulting research assesses the cost savings, productivity gains, and business benefits the KnowBe4 and PhishER platforms can deliver. How does a three-year 276% ROI with a less than three-month payback sound?

  • Ransomware Hostage Rescue Manual

    Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware.