When it Comes to the ROI of Identity Management, the Cloud is a Clear Winner

Companies deploy identity and access management systems for a variety of reasons, and each of these can be tied directly to a real financial benefit. Whether it’s increasing security (and thereby avoiding costly security breaches or data loss), automating application provisioning (thereby saving IT staff’s time) or providing SSO across all devices…

How Okta Helped School of Rock Start Rocking in the Cloud

Jack Black may not have had to worry about IT challenges in his 2003 movie “School of Rock,” but the real of School of Rock does. The music program, which encourages its students to rock on stage and in life, was founded as a single music school in Philadelphia in 1998. Almost fifteen years later, it’s now an international franchise, operating…

Fuel for the Okta Fire: Thoughts on our Series C Funding, Welcoming Sequoia and the Next Big Step

Earlier today, we announced the close of a $25 million round in series C financing led by Sequoia Capital. We’re very lucky to add the Sequoia team to our list of amazing investors – which already includes Andreessen Horowitz, Khosla Ventures, Greylock Partners, and FLOODGATE. The details are highlighted in the press release, but I’d like to share…

A New Bill of Rights, for the Enterprise Cloud Buyer

As we approach the close of the fourth quarter, many of you will be evaluating the investments your company has made in the way of cloud computing and will consequently consider how to maximize these investments. Ray Wang and the Constellation Research team have jump-started the process for you with a new tool, “The Enterprise Cloud Buyer’s Bill…

Keeping it Simple to Keep it Secure

The New York Times recently ran an interesting profile of Peter Neumann, one of the preeminent computer scientists in the world. The story, “Killing the Computer to Save it,” details Neumann’s ideas for how to solve the inherent security vulnerabilities in computer systems that have been repeated again and again for the past 50+ years. Neumann’s…

Encryption in the Spotlight due to Vulnerable Android Apps

Last week, Ars Technica’s Dan Goodin published a story detailing how downloaded Android applications have the potential to expose the sensitive personal data of more than 185 million users. Vulnerabilities due to inadequate or incorrect use of SSL/TLS protocol libraries expose everything from online banking and social networking credentials to e…

Archive

Follow Us