Your Search returned 8617 results from our White Paper Library

Okta logo brightblue0318 150x150


Securing Office 365 with Okta

The nature of cloud apps being accessible via the Internet makes them regular targets by adversaries, including phishing, password spraying, KnockKnock and brute-force...

Dell  logo

Infrastructure Management

The Dell EMC PowerMax 8000 outperformed another vendor’s array on an OLTP-like workload

This report examines enterprise data storage systems and looks at how Dell’s new EMC PowerMax storage solution can support OLTP-like workloads.

Okta logo brightblue0318 150x150


MODERINZING IT - Identity is a Key Tool to Facilitate IT Modernization

Many enterprises are saddled with an IT architecture that has evolved organically over time. The realities of competing priorities, limited staffing and budgets...

Okta logo brightblue0318 150x150


Top 8 Identity and Access Management Challenges with Your SaaS Applications

The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized businesses to Fortune 500 companies, are moving from on-premises software...

Okta logo brightblue0318 150x150


Identity-Imperative for IT Modernization

With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing...

Tessianlogo 1


Building a cybersecurity model for people, not machines

This on-demand webinar discusses how organisations can build a modern and agile people-centric cybersecurity model.


Data management

A Guide to Automated Analytics – How to Stop Running Your Business on Accidental Data Discovery

This eGuide examines how organisations can stop running their businesses on accidental data discovery by utilising automated analytics.

Spie1412 150x150


Endpoint Security – Protecting your biggest attack surface

This solution brief outlines three reasons why endpoints are the primary point of entry for attacks and how Squanto can help tackle these threats.


Data management

The Benefits of Converged Data Protection Platforms for Mid-Sized Businesses

This white paper discusses the benefits that converged data protection platforms can provide mid-sized businesses.


Business Management

Why IT leaders should consider the software defined perimeter

As an IT leader, you are tasked with guiding your organization as it adopts public cloud services and allowing mobile users to work from any device, anywhere, while...

Previous 1 3 4 5 861 862

Recommended for You

International Women's Day: We've come a long way, but there's still an awfully long way to go

Charlotte Trueman takes a diverse look at today’s tech landscape.

Trump's trade war and the FANG bubble: Good news for Latin America?

Lewis Page gets down to business across global tech

20 Red-Hot, Pre-IPO companies to watch in 2019 B2B tech - Part 1

Martin Veitch's inside track on today’s tech trends


Do you think your smartphone is making you a workaholic?