Okta named a Leader in Gartner® Magic Quadrant™ for Access Management for the 8th year in a row

For the eighth consecutive year, Okta has been recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for Access Management. We’re deeply honored to be recognized once again.  Since the inaugural report in 2017, Okta has remained steadfast in our commitment to enabling secure and seamless access for organizations and their customers worldwide…

Okta’s commitment to CAEP and SSF: Pioneering secure, interoperable Identity standards

One component is essential to empowering businesses, partners, and individuals in a digital landscape full of risk: a secure Identity Foundation. That’s why Okta proudly supports the Continuous Access Evaluation Profile (CAEP) and Shared Signals Framework (SSF) — initiatives driving innovation, interoperability, and trust in the Identity ecosystem…

Verifying the Identity of your remote workforce

Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security posture and programs that support its over 19,000 customers. Charlotte has an extensive background in the delivery of security transformation…

Okta wins AWS Global Marketplace Partner of the Year

  Today at AWS re:Invent in Las Vegas, Okta solidified its position as a leader in the Identity space by claiming two prestigious global awards and earning recognition as a finalist in another. These accolades represent a significant milestone in Okta's partnership with AWS and reinforce its commitment to a partner-first growth strategy. They…

The weakest link: Securing your extended workforce

Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security postures and programs that support its over 19,000 customers.  Charlotte has an extensive background in the delivery of security transformation…

Migrating off legacy Tokio at scale

The engine that drives millions of Okta Workflows executions each day was an early adopter of the async Rust ecosystem. While Tokio is the natural choice for an async runtime today, we launched Workflows before the release of Tokio 1.0, and well before the best practices and patterns for async Rust had really solidified.  This article details how…

Okta Workflows authorized at FedRAMP High: A new era of secure automation for the U.S. Public Sector

Okta Workflows is authorized for Okta for Government High As Okta’s U.S. Public Sector leader, my top priority is supporting our public service providers as they modernize IT to improve efficiency and service delivery. This includes adopting modern tools and creating innovative workflow frameworks that streamline burdensome and time-consuming…

Introducing Log Investigator: Transform your security operations with AI-powered log analysis

Detecting and responding to potential Identity security threats is no longer simply an advantage in modern cybersecurity but a necessity. At the same time, as organizations scale their digital operations, Identity security practitioners need access to a richer and more complex set of identity log data than before — one demanding constant attention…

Implementing security best practices in Okta developer orgs

How we’ve fortified security in Okta Developer Edition Service Securing customer-facing services or developer playgrounds is paramount in this age of software development. This post discusses various strategies and measures that we have adopted to fortify our Developer Edition Service. Join us as we walk you through our journey of establishing…

Archive

Follow Us
Share on Linkedin Share on Youtube