Gartner Recognises Okta as an Identity Leader — 7 Years in a Row

Last week, Okta was named as a Leader in Gartner’s fourth edition of its Magic Quadrant for Access Management report. We are the only vendor that has consistently been a Leader since the inception of Gartner’s evaluation of the identity space — starting with the first Identity as a Service (IDaaS) Magic Quadrant seven years ago.  Over the years,…

What Is SMS Authentication and Is It Secure?

SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…

What is Zero Trust Security?

Zero Trust is a security framework based on the belief that every user, device, and IP address accessing a resource is a threat until proven otherwise. Under the concept of “never trust, always verify,” it requires that security teams implement strict access controls and verify anything that tries to connect to an enterprise’s network. Coined in…

10 Tips for Breaking Down the Complexities of Audits & Compliance

In our previous posts for this 5-part series on lifecycle management, we offered various best practices you could implement to better manage identity data, lifecycle processes, and access grants. Today, we’ll review the identity-related challenges surrounding audits and compliance, and offer ten ways to gradually chip away at the complexities of…

What Is an API?

API is an acronym that stands for “application programming interface,” and it allows apps to send information between each other. While there are numerous protocols and technologies involved, the underlying purpose of APIs is always the same: to let one piece of software communicate with another.  APIs (sometimes described as web services) work in…

What Is Attribute-Based Access Control (ABAC)?

Attribute-based access control (ABAC) is an authorisation model that evaluates attributes (or characteristics), rather than roles, to determine access. The purpose of ABAC is to protect objects such as data, network devices, and IT resources from unauthorised users and actions—those that don’t have “approved” characteristics as defined by an…

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorisation credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe? …

What is Hybrid IT?

Hybrid IT is a deployment model that combines solutions of different kinds to form the overall IT infrastructure. Most of the time, hybrid IT combines solutions hosted on-premises with cloud services. Hybrid IT is considered the most popular deployment model (especially in larger organisations). Almost 70% of large enterprises use this type of…

Tags

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube