Okta Privileged Access is generally available

We are thrilled to announce the general availability of Okta Privileged Access, our new privileged access management (PAM) offering, beginning on December 1. Okta Privileged Access is a powerful solution that elevates your security infrastructure and helps provide controlled access to your critical systems, applications, and data. This empowers…

Behind the scenes at Access Requests: Worker tasks

Image generated using DALL-E Background Okta’s inbox platform supports various products in Okta’s Workforce Identity Cloud, where human input is required. It is most notably instrumental in the Access Request flow of Okta Identity Governance. A lot of what we do is trigger-based. These triggers can be a human action — “grant access when the…

Why Identity is the I in… Time Tax

Here’s the second blog in our series detailing how focusing on Identity can help your organization improve end-user experiences and meet consumer expectations.  If you work for or support a government agency, you’re well aware of the recent legislative and industry push to improve digital experiences for the American public.  Examples run from the…

Okta joins the CNCF to shape the future of cloud computing

We're thrilled to announce that Okta, the leading independent Identity partner, is now a proud member of the Cloud Native Computing Foundation (CNCF). This partnership marks a step forward in our commitment to the ever-evolving world of cloud-native technologies and reaffirms our dedication to providing secure and seamless Identity and Access…

Okta Welcomes the Biden-Harris Administration’s Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence

The Administration’s release of the Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence is an important step forward for the thoughtful and responsible development and deployment of Artificial Intelligence (AI). We support the goals of the Executive Order to embrace the beneficial impacts that come with AI while mitigating…

Top 3 actions for technologists to help maximize the value of your business’ cybersecurity insurance

I recently had the privilege of organizing a knowledge-sharing webinar, where we brought together a panel of cybersecurity insurance (CSI) experts. Our discussion revolved around the present and future state of the industry, and I gained a wealth of valuable insights along the way that inspired this blog.  One of the prevailing themes during the…

What is AI?

Artificial Intelligence (AI) may be organizing our social media timelines and automatically improving the pictures on our phones, but it’s a field that’s widely misunderstood.  AI is, after all, an incredibly complex field in computer science, where the top researchers earn as much as NFL quarterback prospects. It introduces terms seldom found in…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube