Tech Library White Papers

See our Free Webcasts.

Free White Papers Sponsor Index

  • API Security White Paper

    This whitepaper describes the modern API Security landscape, and how to effectively leverage OAuth 2.0 and API Gateways for authentication and authorization from both the infrastructure and software development mindset.

  • CMS Case Study

    The Centers for Medicare and Medicaid Services (CMS) needed to design an information-gathering process that ensured the best providers received the greatest benefits. The team took an API-first approach, connecting to clinical data registries that already collect information about healthcare quality and outcomes. Read a case study to learn why they chose Okta API Access Management and how it allows CMS developers to focus on streamlining the provider experience, while Okta securely controls access to relevant websites and APIs.

  • API Security White Paper

    This whitepaper describes the modern API Security landscape, and how to effectively leverage OAuth 2.0 and API Gateways for authentication and authorization from both the infrastructure and software development mindset.

  • API Security Infographic

    Recent data breaches reported by major enterprises have made it clear that APIs are an increasingly-popular attack vector for hackers. This rising trend has a lot to do with how APIs traditionally grow and evolve within companies. View this infographic to understand the lifecycle of an API and what to do next.

  • Threat Impact and Endpoint Protection Report

    Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter. Despite the many security offerings available, organizations continue to fall victim to ransomware attacks. Learn more.

  • CEO Fraud Prevention Manual

    CEO fraud is responsible for over $3 billion in losses. Don’t be next. The CEO Fraud Prevention Manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim. Learn more.

  • Ransomware Hostage Rescue Manual

    Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention Checklist. Learn more.

  • The 2019 Phishing Industry Benchmarking Report

    The 2019 Study analyzed a data set of nearly nine million users across 18,000 organizations with over 20 million simulated phishing security tests. In this report, research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks.

  • User Lifecycle Management Proves Costly to IT

    This study investigates the differences between manual versus automated lifecycle management. Finding organizations that rely on a manual onboarding and offboarding processes have prolonged project timelines, increased costs, and heightened security risks.

  • HR-Driven IT Provisioning

    Read this whitepaper to learn how Okta’s cloud-based identity management service is the easiest way to integrate employee information from HR and IT systems, including Active Directory and other critical business applications.

  • Data Migration Risk Assessment Template

    In this guide, we’ll outline the key questions to ask ahead of time, allowing you to perform a thorough data migration risk assessment that will flag-up potential bumps in the road, helping to ensure a smooth transition as you upgrade your IT ecosystem.

  • 10 Best Practices for Reducing Spend in Azure

    Is cloud waste driving up your spend? Download this eBook to learn proven approaches to reduce Microsoft Azure spend by eliminating unnecessary cost drivers and optimizing usage.

  • 9 Best Practices for Reducing Spend in Your Multicloud Environment

    Is cloud waste driving up your spend? Download this eBook for proven approaches to reduce cloud spend by eliminating unnecessary cost drivers and optimizing usage.

  • Application Driven Cloud Optimization

    Applications now make or break businesses, with customers interacting through digital and mobile experiences. In today’s multi-cloud world and container architectures, enterprises are challenged to manage application resourcing with existing IT staff and skills. In this white paper, follow the path of industry leaders who deliver always-on application performance in Azure environments.

  • Debunking the myths of hybrid cloud adoption

    IT departments are better prepared to support changing business requirements with flexible hybrid cloud provisioning and management platforms. Microsoft and Red Hat enterprise customers have a proven foundation to support the development of their own open source strategy. Download this analyst paper to learn how.