Meet Our New Product Series: The Production Line

At Okta, we are passionate about customer success and driving your organization forward with technology that makes you more successful, secure and productive. This year, in celebration of our 10th Anniversary, we reflected on the evolution of the product, and today, we’re launching a new monthly product series that dives into our desire to…

Introducing… The Dogfooding Chronicles

Here at Okta, our goal and mantra is to securely connect the right people to the right technologies at the right time. “Dogfooding” our product (our definition below), is a key element in obtaining this goal, and the team that gets it done is the Okta on Okta team. In the coming months, The Dogfooding Chronicles will give you a glimpse inside Okta…

Okta Partner Awards: Our Partners of the Year

At Okta, partners are fundamental in helping us to become the identity standard. From the Okta Integration Network (OIN) and our Technology Partners to our Solution Providers and GSIs, all Okta partners are truly an extension of Okta. We’re an integration company, and our success is predicated on the fact that we have a powerful partner ecosystem…

3 Things You Can Do to Prevent Account Takeovers

As you likely know, 2018 was not a good year for data security. In the first half of the year, there was a 133% increase in compromised company records compared to the first half of 2017, and an average of 291 records stolen every second. Unfortunately, just a few months in, 2019 has already seen a number of big name corporation data breaches…

The Case for Securing your B2B Connections

Whether you’re a clothing company integrating with an online shopping platform, a kitchen appliance manufacturer offering smart interfaces, or a nutritional supplement provider releasing a health app, these days every company is a technology company. In this new business landscape, innovation goes hand-in-hand with collaboration, as more and more…

Employee Security Training: The Basics

2018 witnessed a slew of cyber attacks affecting enterprises like Whole Foods, Macy’s, Uber, Facebook, Google+, Under Armour, and many more. According to the Ponemon Institute's 2018 Cost of Data Breach report, the average total cost of data breaches rose from $3.62 million in 2017 to $3.86 million in 2018—an increase of 6.4%. The report also…

OAuth: When Things Go Wrong

Picture this: you sign up for a new app, and it asks if any of your friends are using it. In order to find out, the app asks for your email address...and your password. While it seems ludicrous now, this was once considered a normal user flow. But many apps still need permissions from third-party programs. And if users can’t do this safely, they…

Embracing the Kanyes of Our Organization

Let’s talk about Kanye. You might remember that he was featured on international news when he entered his phone password on live TV. But the part that earned him national mockery was the password itself: 000000. It’s easy to laugh at the example he set, but, unfortunately, his attitude towards security is similar to many people today. And when…

Trust and Transparency – the New Okta Trust and Status Sites

As a cloud-native company, our customers are counting on us to be globally accessible, have 100% reliable service, and maintain up-to-date security policies -- in other words, be always on. All of that depends on trust. And that trust starts with transparency. So with trust and transparency as our dual goals, we’re excited to announce two new…

A Path to Achieving Network Security ZEN

As new philosophies around network security arise alongside ongoing technological advances, forward-thinking companies are changing the way users interact with—and feel about—network security as part of their work day. People are the new perimeter Up until recently, network security relied upon a network perimeter—anything inside the perimeter…

Archive

Follow Us