

How content sprawl happens, why it matters, and steps every IT leader should take to avoid it.
Sprawl happens when anyone and everyone can create a site or team, usually without oversight, planning, or any kind of formal training, resulting in dozens/hundreds of rarely used or abandoned sites and teams, a poorly-performing...
Published: Jan 18, 2021


Over 50% of businesses are preparing for long-term, flexible work patterns. But the rush to adopt remote technology and maintain service levels has left businesses unable to secure operational resilience.
This Xerox guide explores how cloud infrastructure, security, automation, and managed support can futureproof...
Published: Feb 24, 2021


All of a sudden, you (and everyone else) found yourself working from home (WFH). The one advantage was the lack of a soul-crushing commute. Unfortunately, many of your co-workers had never really signed in from home, so help desk calls reached an all-time high. Questions ranged from how to access protected files, to whether...
Published: Feb 09, 2021


When evaluating application security vendors, you have a great deal to consider. Understanding your goals will help. If your goal is vendor consolidation then selecting those offering multiple security capabilities over single products may make more sense. If your goal is out-of-the-box functionality then understanding...
Published: Feb 08, 2021


Read how an IT services firm enhances UNIX security while simplifying management.
Published: Feb 19, 2021


Deploying a robust log management solution on end-points can be challenging. Monitoring remote end-points introduces more complexity to log management as remote connections can be unreliable, lack bandwidth and are often insecure. Most log collection tools and agents shipped with SIEMs lack the ability to ensure the confidentiality...
Published: Feb 18, 2021


The story of 2020 is of the devastating COVID-19 pandemic, and of how the world adapted. The story of malware in 2020 then, is a story of how the tools and tactics of cybercrime and cybersecurity changed against a backdrop of enormous changes to ordinary life.
As entire businesses switched to remote working, IT teams...
Published: Feb 24, 2021


The metaphorical storm clouds that 2020 brought, undoubtedly contain business-critical silver linings. These will affect the way we all work going forwards in a positive manner. That was the general consensus from five leading technology directors who recently participated in the Okta-sponsored Hot Topics series: “Dynamic...
Published: Feb 05, 2021


Gone are the days when IT operated in a dark, back-office environment, where they had little to no impact on the business or the employees they serve. IT leaders now see themselves as fundamental pillars of the business, moving from simple IT operation to the more complex IT orchestration, where they are actively serving...
Published: Nov 03, 2020


Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users, but with other platforms such as Unix, Linux, and Mac OS X providing critical services as well. But each of these systems has its own identity, authentication, and access requirements....
Published: Feb 19, 2021


Security Information and Event Management (SIEM) solutions form the core of many organizations’ security strategy, but SIEMs can be expensive, eat up storage and get overwhelmed by the amount and number of formats of log data that they need to process.
But there is a way to optimize the performance of your SIEM...
Published: Feb 18, 2021


This paper delivers guidance for using Dell EMC TM PowerStore TM T model arrays in an Oracle ® 12cR2 (and later versions) Oracle Standalone environment. The document also includes guidance for the Real Application Clusters (RAC) database environment on Linux ® operating systems.
Learn more about...
Published: Jan 26, 2021


This book consists of five chapters that explore:
The importance of identity, what it is, and how it has evolved (Chapter 1)
What modern identity (Identity as a Service) is and how it helps organizations address identity challenges and different use cases (Chapter 2)
The components of...
Published: Feb 05, 2021


With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems—with Microsoft Windows at the forefront—Unix-based organizations face many identity and access management (IAM) challenges.
This white paper...
Published: Feb 19, 2021