Okta

Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Innovating Identity on the Blockchain

Read More

An Experience Developers Love, Enterprises Trust: Okta for Customer Identity

Read More

Identity and Device Management for The Extended Enterprise

Read More

Okta for Startups: Free Identity Tools for Entrepreneurs

Read More

Context + Access: How Identity-Driven Security Can Prevent Breaches in Your Business

Read More
#LifeAtOkta
Technology
Partners
Company + Product
Customers + Partners
Industry Insight

InfoSec

Becoming an IT Leader: Theory vs. Practice

IT leaders have tough jobs. They’re expected to maintain the technology required to support daily business operations; introduce new forms of technology that deliver competitive business advantage; spend as little money as possible; keep their teams happy and productive; establish close working relationships with their business partners; and work collaboratively...

Building on a History of Industry Recognition: Okta named a Leader in Forrester IDaaS Research

This week, analyst firm Forrester released research recognizing Okta as a Leader in the Identity-as-a-Service market (IDaaS). The report, The Forrester Wave™: Identity-As-A-Service, Q4 2017,* ranks Okta the highest in both the “current offering” and “strategy” categories among seven IDaaS vendors. You can check out the Wave graphic and get...

Why Okta is the Box Technology Partner of the Year

When we think of the needs of companies scaling to the cloud today, we think of mobility, collaborative digital workspaces, a shared and secure hub of information for team members, and the need for a central point of control. We have watched Box grow into the go-to content management...

By Matt Dort

Case Study: Don’t Let Active Directory Hold Back your Modern Access Strategy

Microsoft’s Active Directory (AD) has been a cornerstone for authentication in enterprise-grade systems for years, responsible for features such as SSO and storing sensitive login data. However, the past two decades have seen more enterprises shift from legacy on-prem infrastructure to best-in-class SaaS applications, requiring them to reevaluate their...