Resources
![Make your MFA adaptive with Actions templates](http://images.ctfassets.net/2ntc334xpx65/S1GU6zaae590lRAZK220j/325f2e25b9912dd51d977e4fd7706b52/Cover_only__1_.png?w=560)
Whitepapers
Make your MFA adaptive with Actions templates
![Connect your application to Salesforce with first-party data](http://images.ctfassets.net/2ntc334xpx65/3HyoydhqIYsy7TeDWQjHwH/ac5bba02bb421e225c23df276c82e8ae/Cover_only__2_.png?w=560)
Whitepapers
Connect your application to Salesforce with first-party data
![Flag sensitive transactions for step-up authentication](http://images.ctfassets.net/2ntc334xpx65/2kfSrz6vPKaSEsKy3NB3vh/e87275d8583a66da0d26a31a873ab7f3/Cover_only.png?w=560)
Whitepapers
Flag sensitive transactions for step-up authentication
![Learn CIAM by example: 4 recipes to improve security and UX](http://images.ctfassets.net/2ntc334xpx65/2E5mGRpLVBa6FOTUZsKUCL/54fa4ef76b1db950ebb694029b5c033f/learn-ciam-by-example-cover.png?w=560)
Whitepapers
Learn CIAM by example: 4 recipes to improve security and UX
![Secured and Assured Unit 4 Brief](http://images.ctfassets.net/2ntc334xpx65/hvMDig7Qz2B5pvhV1nxqg/c5f6072d3dcc126fc5e89277222dcde5/-Landing_Page-_S_A4.jpeg?w=560)
Whitepapers
Secured and Assured Unit 4 Brief
![Secured and Assured Unit 3 Brief](http://images.ctfassets.net/2ntc334xpx65/2IGhBthTYcD52tr8DN3Ehi/df12f73205c6b55bfb08cf1f576e522a/-Landing_Page-_S_A3.jpeg?w=560)
Whitepapers
Secured and Assured Unit 3 Brief
![Secured and Assured Unit 2 Brief](http://images.ctfassets.net/2ntc334xpx65/239s2QBg4WwGpf5Q1yK07U/2f584f88df43d5d54bc40bd5ca17d3b7/-Landing_Page-_S_A2.jpeg?w=560)
Whitepapers
Secured and Assured Unit 2 Brief
![Secured and Assured Unit 1 Brief](http://images.ctfassets.net/2ntc334xpx65/5ZT55dKPgWbvAmBoNIMKUT/1bdf336074fb7a9c01323551a947ab99/-Landing_Page-_S_A1.jpeg?w=560)
Whitepapers
Secured and Assured Unit 1 Brief
![Case Study: NCBI](http://images.ctfassets.net/2ntc334xpx65/2Wq3Fb90KMpTqLfp9DDkkf/4820e007c79a0159fd4e5af9ac213ade/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560)
Whitepapers
Case Study: NCBI
![Case Study: The Last Mile.Org](http://images.ctfassets.net/2ntc334xpx65/23mVwcvK3BpJqdq4UjqR1w/de9e22fa1f6c76833a147f81ca0ecfea/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560)
Whitepapers
Case Study: The Last Mile.Org
![How Auth0 Satisfies Cyber Essentials Technical Control Themes](http://images.ctfassets.net/2ntc334xpx65/dty2SclSUsB5GN2YJuDHB/2bae771c4157251cc2bdb6c74f2e687b/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560)
Whitepapers
How Auth0 Satisfies Cyber Essentials Technical Control Themes
![Why Choose Social Login?](http://images.ctfassets.net/2ntc334xpx65/ETskVb5oX4Qien0QVGnyP/01bfd1e90df0317890b4c09541fedb29/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560)
Whitepapers
Why Choose Social Login?
![Do not use - 2022 Gartner® Magic Quadrant™ for Access Management](http://images.ctfassets.net/2ntc334xpx65/2XqeIZExut0D75qSCJRO2P/49d43e218356d6d4daf7044bd94fc9f1/Gated_Content_cover.png?w=560)
Whitepapers
Do not use - 2022 Gartner® Magic Quadrant™ for Access Management
![2021 State of Secure Identity Report](http://images.ctfassets.net/2ntc334xpx65/6iQtdFVHZuqYXpBpsVJ41e/37a0d7307e8f197b5eb11f3c79f0327a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560)
Whitepapers
2021 State of Secure Identity Report
![2022 State of Secure Identity Report](http://images.ctfassets.net/2ntc334xpx65/2HhAd9yNPRoOrnOShb1izR/22c192e2f0378941e9b4196d7f919f22/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560)
Whitepapers
2022 State of Secure Identity Report
![Personal Cybersecurity Checklist](http://images.ctfassets.net/2ntc334xpx65/AE5C2FvxvUjNa75z6os6M/ae246135bfe77d68372343fba604479c/PersonalCybersecurityChecklist_2x.png?w=560)
Whitepapers
Personal Cybersecurity Checklist
![The Log Inn Re-Welcome Pack](http://images.ctfassets.net/2ntc334xpx65/1nNWXdHcBFftid3ZsFssuu/5bf7cbc7b8e32425ebb91d656775cbc8/loginnrewelcomepackthumbnail.png?w=560)
Whitepapers
The Log Inn Re-Welcome Pack
![The Log Inn CIAM Buyer's Guide](http://images.ctfassets.net/2ntc334xpx65/6kjqpyfjHAMIQXPxcOBKRC/a13f3cf3d522dfe43372d39db4642eab/loginnciambuyersguidethumbnail.png?w=560)
Whitepapers
The Log Inn CIAM Buyer's Guide
![The Log Inn Guestbook](http://images.ctfassets.net/2ntc334xpx65/1JfMLqe1MbwivJoyzUsVH8/b7767d570597b0885916ceda6b8e3774/loginnguestbookthumbnail.png?w=560)
Whitepapers
The Log Inn Guestbook
![The Log Inn Leaky Revenue](http://images.ctfassets.net/2ntc334xpx65/2dnkkXBhIbxxYT1zBhsmkP/3ad25a9484504f7d83e6e279d1f98f46/loginnleakyrevenuethumbnail.png?w=560)
Whitepapers
The Log Inn Leaky Revenue
Secure access for everyone.
But not just anyone.
But not just anyone.