Top White Papers and Webcasts

  • The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider, to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.   Before initiating a change from your current AV solution read this guide to learn: • How to plan an AV …

  • Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few.   Office 365 uses several authentication methods and access protocols, but some of their authentication methods and legacy authentication protocols do not support MFA in their authentication flow. Attackers know this and commonly abuse these vulnerabilities to …