RCP Tech Library

See our Free Webcasts.

Free White Papers from our Sponsors

  • Partner Profile: How Tech Data and Microsoft Can Provide Strengthened Data Protection

    When it comes to improving data protection in Office 365, IT distribution giant Tech Data sees a big opportunity for partners. In this Partner Profile, cloud solutions director Mike Ward describes how partners can capitalize on this backup opportunity by urging customers to move to Microsoft 365 Business Premium and to adopt a powerful third-party backup solution like Veeam Backup for Office 365. Together, these products give partners a more robust and cost-effective backup framework to pitch to customers -- a win for everyone involved.

  • 8 Essential Features You Need in Your Next Healthcare Collaboration Solution

    In healthcare operations, every meeting has the potential to impact the well-being of patients, making the right collaboration solution essential. This ebook describes the eight crucial features your next collaboration tool must have.

  • 8 Essential Features to Look for in Your Next Classroom Collaboration Solution

    Digital technology has completely revolutionized the learning experience. A critical element of digital learning is unified communications and collaboration (UCC) solution. This ebook lays out the eight crucial features a classroom UCC platform must have.

  • 8 Essential Features to Look for in Your Next Business Collaboration Solution

    A company that can improve collaboration between employees, clients, and leaders will have a natural advantage over more siloed competitors. This ebook describes eight features that should be a part of your next collaboration solution.

  • To-customer eBook for MSPs: Help your Sales Team close M365 Backup deals

    Microsoft 365 offers industry-leading cloud security – however not the complete data protection your client's demand. Explaining “Why M365 Needs Backup” is tricky. Download this ready-to-use, To-Customer eBook to help Sales close high-value M365 Backup deals.

  • The Hidden Costs of Ransomware

    The true cost of ransomware infections includes more than just the ransomware payment. Even with security measures in place, defensive layers must be implemented to reduce the threat surface area. We spoke with business leaders and IT professionals to find out how their organizations were affected by ransomware, beyond losing access to their data and paying a ransom.

  • Carbonite Data Protection & Cyber Resilience

    Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data.

  • Small and Midsize Businesses: Rip the Target Off Your Backs

    SMBs have limited time and IT resources, and a lot on their plates – especially when it comes to cybersecurity. Unfortunately, SMBs have become the biggest target for ransomware attacks, and they need to face the harsh truth that ransomware can wreak havoc with data, budget and reputation. This paper will debunk the most common myths surrounding ransomware, and present ways to help prevent ransomware attacks, protect data and ensure an adequate recovery procedure.

  • How Secure is Your Cloud Data?

    While the public health crisis will eventually fade, flexible remote work arrangements are likely here to stay. Remote workers may continue to be as productive as before, or better, but only if their cloud data and applications are safe from the common causes of data loss.

  • Security Tips for Protecting your Backup Servers

    Businesses today are evaluating and implementing a multi-layered approach to securing and protecting company data. This paper will focus on additional measures and techniques to specifically protect the backup environment, as well as the Carbonite multi-layer approach for securing your data, part of our cyber resilience philosophy.

  • COVID-19 Clicks - How Phishing Capitalized on a Global Crises

    As a cybercriminal tactic, phishing has been around for a long time. So why is such an old method of internet trickery still so common? The answer is simple: because it’s still wildly successful. So why are people still clicking?

  • Case Study: Bordonaro MSP offers fast and reliable migrations

    Germany-based MSP offers reliable migration from Hyper-V servers to Azure Stack Hub with super-fast cutover using Carbonite® Migrate.

  • The Radicati Group - Endpoint Security - Market Quadrant 2020

    An Analysis of the Market for Endpoint Security Revealing Top Players, Trail Blazers, Specialists and Mature Players.

  • Lockdown Lessons eBook

    They say the best defense is a good offense, but in cybersecurity we often say the best defense is prevention. Yet, as cybercriminals continue to innovate and refine their methods, the truth is complete prevention of attacks may never be fully possible.

  • eBook: Hacker Personas

    Staying informed on today’s ever-changing cybersecurity landscape is vital for mitigating threats and keeping businesses safe. This educational eBook, the sequel to the popular “Why Hacker’s Hack” series, explores cybercriminal personas and who is most likely to fall prey to these scam artists. Learn why it’s important to get informed on their methods, motives and strategies of choice.

  • COVID-19 Clicks - How Phishing Capitalized on a Global Crises Infographic

    We surveyed 7,000 office workers in the US, UK, Australia/New Zealand, Germany, France, Italy and Japan on their understanding of phishing, their email and click habits, and how their online lives have changed since the beginning of the COVID-19 pandemic. Here’s an overview of the findings from around the globe.

  • The Definitive Guide to IT Security

    In this definitive guide, Liongard contributors Art Chavez (Information and Application Security Architect) and Vincent Tran (CISSP, Founder and COO) will take you through the various ways your MSP can protect itself and your customers, including: