Tech Library White Papers

See our Free Webcasts.

Free White Papers Sponsor Index

  • Special Report: Security Predictions 2019

    Our annual Security Predictions report offers unique insights into what we can expect from attackers, victim organizations, security vendors and nation-states in the coming year. These insights come directly from FireEye senior leaders and experts on a variety of teams who are on the frontlines of cyber security, including FireEye Threat Intelligence, Mandiant Consulting, and FireEye Labs.

  • Everything You Need to Know About Office 365 Tenant to Tenant Migrations

    Read this eBook on Office 365 Tenant to Tenant Migrations featuring Microsoft MVPs sharing their experience and guidance with tips for migration preparation, communications planning, directory synchronization and much more. Learn more.

  • Complete Guide to Eradicating PST Files

    With email storage no longer an issue, the need for Personal Storage Tables (PSTs) no longer exists. Read this Complete Guide to Eradicating PST Files to find out how you can be PST free. Learn more.

  • How to Improve the Security of Office 365

    Read "How to Improve the Security of Office 365" to find out how you can protect your organization with steps to make sure you have strict policies and procedures in place. Learn more.

  • Autopilot Review

    Read this review of Quadrotech Autopilot, a SaaS application running on the Microsoft Azure Service Fabric that provides hierarchical on-premises Active Directory Organization Units, Group Policy Objects to an Office 365 tenant, and more. Learn more.

  • The Microsoft Office 365 Reporting

    Read this paper on how Radar Reporting can arm you with a customized dashboard that provides customization for your environment, daily, weekly, and monthly reports, maximizes Office 365 ROI and more. Learn more.

  • 6 Discoveries IT Security Pros Need to Know About SSL Inspection

    Read this summary of the survey that identifies key outlooks that may help your organization make security and business decisions, including these findings that SSL-based evasion is more common than you think.

  • 5 Steps to Enhance Your Enterprise Security Steps with High Performances SSL/TLS Decryption

    Read this eBook to find out about five steps you can take to enhance your enterprise security, including how to defend against cyber attacks with full visibility into encrypted traffic.

  • Advanced Load Balancing in the Cloud - 5 Ways to Simplify the Chaos

    Read this eBook to find out about five areas to consider when looking at how to unravel your cloud complexity, including visibility and analytics, integrated security, and intelligent automation.

  • The Benefits of Migrating from ADFS

    Read this whitepaper and learn about the efficiency and TCO benefits of migrating from ADFS.

  • Removing the Identity Barrier for Office 365 Migrations

    Read this whitepaper to learn how Okta’s cloud identity service can be used to accelerate and simplify your Office 365 deployment and increase overall security.

  • Office 365 Adoption eGuide: Identity and Mobility Challenges

    Microsoft Office 365 is the most popular application used by Okta’s customers. This eGuide starts with data from the Okta Integration Network on the trends we are seeing around Office 365 and some interesting insights.

  • 6 Reasons Microsoft Customers Choose Okta for Identity Management

    If your organization uses Microsoft and is undergoing IT modernization, you know how frustrating it can be when legacy systems and modern cloud technologies and applications don’t get along.

  • Open DQ Managed Data Services

    Power your next generation data applications with clean data and the single version of the truth across the enterprise. Learn more.

  • The survivor’s guide to building an Office 365 network

    Migrating to Microsoft Office 365 can be complicated. Even with careful planning, deploying Microsoft Office 365 and delivering a fast user and application experience can be a challenge. While most organizations assume their traditional networks are ready for the migration, many don’t realize that Microsoft recommends a different strategy. Learn more.