Tech Library White Papers

See our Free Webcasts.

Free White Papers Sponsor Index

  • What’s New in Active Directory

    While Active Directory (AD) has been around since Windows 2000 Server, Microsoft has continued to make adjustments and introduce features in newer Windows Server releases, especially in Windows Server 2012. What’s New in Active Directory 2016 covers different AD features and the requirements to enable them. Learn more.

  • Business Disaster Recovery Strategies

    This paper will help you prepare for outages in your infrastructure by sharing disaster recovery (DR) strategies. Often, DR outages are not a complete outage, so being prepared with granularity in your DR strategies gives you flexibility. Learn more.

  • Multi-cloud Strategies Are on the Rise

    With most organizations currently using public cloud infrastructure in the form of Infrastructure as a Service (IaaS) or Platform as a Service (PaaS), building an effective Availability strategy is becoming more and more of a priority. ESG recently surveyed 318 mid-market and enterprise IT decision makers in North America to better understand the current trend in adopting a multi-cloud strategy. Learn more.

  • Advanced Data Protection Using Veeam and NetApp Technology

    Learn how organizations can attain RTPOs of <15 minutes for all applications and data while improving business speed when NetApp storage is combined with Veeam. Register now.

  • Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

    For the second year in a row, leading IT analyst firm Enterprise Management Associates (EMA), has delved into the world of security awareness and policy training. Their latest research on this topic revealed that a tremendous shift in awareness training programs has taken place, especially in small and medium businesses. Learn more.

  • Get Your Ransomware Hostage Rescue Manual

    Being in IT I’m sure you know someone who’s been hit with ransomware or you have been through it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent it in the future? Now you do! Learn more.

  • Your Money or Your Life Files! A Short History of Ransomware

    This white paper provides a history of ransomware and what you can do to prevent being attacked. Learn more.

  • The Phishing Breakthrough Point

    Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place, phishing tests can create organizational social engineering blind spots. Learn more.

  • Best Practices for Dealing with Phishing and Next-Generation Malware

    Phishing and malware threats are skyrocketing as cybercriminals become more adept, stealthier and more able to penetrate your IT security defenses. The consequences of even a single attack penetrating your network can be devastating, resulting in enormous potential losses. Learn more.

  • 7 Cloud Security Best Practices for Amazon Web Services

    If you’re getting ready to move your data to Amazon Web Services or already have, here are seven best practices for AWS we recommend getting the most out of your cloud security. Learn more!

  • Conversational Amazon Web Services (AWS)

    Read this free eBook by Brien Posey to learn about some of the more important AWS components.

  • Better Active Directory Auditing - Less Overhead, More Power

    Today´s organizations continue to struggle with Active Directory auditing. Learn how to improve Active Directory auditing without making dramatic infrastructure changes in this white paper written by industry expert, Don Jones. Learn more.