Tech Library White Papers

See our Free Webcasts.

Free White Papers Sponsor Index

  • Top Seven Reports for Supporting a Growing Virtual Workforce

    IT environments are more dynamic than ever, and having more users working from home introduces new vulnerabilities. You undoubtedly want to take full advantage of the tools you already have to strengthen Office 365 security and compliance — but you probably just don’t have the time to go digging through them to find what you need.

  • Hacking Active Directory - Security Lessons from a Penetration Tester

    Globally, more than 95 percent of Fortune 1000 companies rely on Active Directory (AD) for authentication and single-sign-on support for their user populations. As it is nearly everywhere – in every company, organization and government agency – this makes AD a primary target for attackers looking to steal your intellectual property, your customer data or to hold your data for ransom.

  • Merger & Acquisition IT Integration Checklist: Active Directory

    If your organization is involved in a merger and acquisition, the impending IT integration project might seem overwhelming. But it needn’t be. In fact, the project can be the perfect opportunity to clean up, consolidate and modernize your Microsoft IT infrastructure to meet the business requirements you’re facing anyway.

  • Top 10 Active Directory Security Reports and Alerts You Need

    Check out this white paper to discover the top 10 reports and alerts you need to ensure the stability and security of your on-prem or hybrid Active Directory, and see how easily you can get them with Change Auditor.

  • Effective License Management with a Changing Remote Workforce

    Office 365 and Azure AD licenses often consume the biggest chunk of IT budgets. Are you paying more — maybe a lot more — than you need to?

  • The Definitive Guide to SharePoint Migration Planning

    The most important part of any migration is the preparation — plan properly before you migrate anything, and not only will your migration go more smoothly, but you will have a healthier target environment going forward, which will reduce risk as well as support and maintenance costs.

  • Preparing for Attacks that Seek Total Annihilation

    Defending your IT infrastructure against attack has never been a simple task. But things have taken a decidedly ugly turn of late: More and more attacks are simply seeking the total annihilation of your infrastructure. Any organization can be a target - or simply collateral damage from an attack targeting someone else.

  • Simplify Your Security Operations

    Learn how automation can help you safeguard your business and respond to growing security threats faster.

  • Recon Research Evaluates BlueJeans Gateway CVI for Microsoft Teams

    Recon Research provides an in-depth evaluation of the BlueJeans Gateway for Microsoft Teams. Read the full evaluation report from Recon Research to see how you can easily and quickly start having Teams meetings from your standards-based room systems with BlueJeans Gateway.

  • From Zero to Hero: The Path to CIAM Maturity

    In this eBook, we define and discuss four key phases on the path to customer identity and access management (CIAM) maturity and the pain points that companies encounter in each phase of the maturity curve. We propose solutions for each of these problems, providing a roadmap for the tools and processes you should adopt as your organization moves ahead.

  • Ransomware Resiliency Strategies

    Ransomware is here to stay. As much as we don’t like to hear that, we have to admit that it’s no longer a question of "if," but “when” and “to what extent” your business might be affected. Rather than just hoping it won’t affect you, explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. Today’s backup technologies can offer in-flight malware checks, immutable backups, and more!

  • Build vs. Buy: Key considerations and the advantages of a pre-built identity solution

    Architects and engineering leaders are often unsure about whether a comprehensive identity and access management (IAM) solution from an outside vendor is right for their project. This whitepaper features the key factors to consider when making a build vs. buy decision, as well as the advantages of a pre-built solution.

  • Managing Identity So You Can Scale

    To meet the high expectations of today’s customers, reduce development time of digital experiences, and eliminate potential security gaps, organizations need to put their customers’ identity front and center. Read a whitepaper to learn more about how Okta can help you meet your customers’ expectations and more.

  • 2020 Data Protection Trends

    Veeam and phoenixNAP bring you an insight into the IT challenges, strategies, and goals of more than 1,550 enterprises worldwide to help understand IT modernization trends and data protection best practices. Download it today to learn how they expect to be prepared for the IT challenges they face, including reacting to demand changes and interruptions in service, as well as more aspirational goals of IT modernization and Digital Transformation.

  • Best Practices for Deploying MS Teams with Video

    Need to extend Microsoft Teams capabilities across your organization to any device? This Nemertes research report highlights best practices for deploying Microsoft Teams with video meetings, focusing on integrating Microsoft Teams with standard video endpoints.