The Production Line: Device Trust

In this edition of The Production Line, we’re stepping through an ambitious feature that works to solve a problem almost every modern enterprise organization will have to face: the future of work. In 2017, Device Trust started life as a beta with a complex mandate: be a desktop and mobile solution that allows organizations to access sensitive…

Okta and AWS Partner to Simplify Access Via Session Tags

In order to gain more control over their access to AWS resources, Okta administrators often need to create numerous AWS roles. This allows them to manage which users have access to sensitive and/or expensive AWS resources. The challenge this creates is the screen below, where, throughout the day, users need to switch between various roles to get…

Why Your Customers Need Passwordless Authentication

In today’s threat landscape, passwords have become increasingly ineffective for protecting customer authentication and data—and they’re also unintended inhibitors for user experience. As such, it’s not surprising that many organizations are exploring passwordless authentication as a more secure, user-friendly alternative. In our previous post in…

Okta One-Minute Case Study: Albertsons

Thanksgiving is almost upon us, and there are few things more traditional than sitting down with friends and family for a delicious meal—or waiting in a grocery line for its ingredients. And while we’re all for tradition, today, many opt for a hassle-free online shopping experience. Albertsons Cos. knew this and used Okta to make sure they could…

Holiday Work Habits by Okta

The holiday season means different things to different people, but some aspects of it are universal: reconnecting with family and friends, eating great food, and taking the time to unwind from work. At Okta, the holidays are also a chance for us to look back at the data we’ve gathered from our more than 7,000 customers, and 6,000 apps and…

Seeing Art in Systems: A Day in the Life with Lauren Wagner

Lauren Wagner, senior manager of marketing technology and operations, leads one of the most cross-functional teams in Okta’s marketing organization. In this edition of the Day in the Life series, learn how Lauren empowers her team and the marketing organization to bring systems to life. How did you find out about Okta? At my last company we used…

How to Improve Security and Usability with Passwordless Authentication

Enterprises have traditionally relied on passwords to log their employees into their accounts and services—but the practice is coming under increased scrutiny due to more modern and secure passwordless alternatives. In a previous post, we explored how businesses can adopt passwordless authentication through alternatives like factor sequencing,…

How to Enforce Least Privilege Access on Linux Servers Using Sudo

Security is and should be outcome-oriented. In that spirit, access management can be boiled down to a single phrase—ensuring that only the right people have the right levels of access to the right resources under the right conditions at the right time. In a true Zero Trust world, granting access through the front door isn’t enough, you also need…

Okta Scores Highest in B2B and B2C Use Cases in Gartner 2019 Critical Capabilities for Access Management

Okta has long been the leader in Identity and Access Management for workforce use cases, driven by the massive shift towards best-of-breed, cloud adoption. But an even larger shift is upon us as every company races to become a technology company, reimagining their customer-facing digital experiences in the process. Against this backdrop, identity…

Taking in the 2019 NASCIO Conference: How We’re Helping Government Agency CIOs Stay Secure and Compliant

Having just attended and sponsored the 2019 National Association of State Chief Information Officers (NASCIO) Annual Conference in Nashville, I was struck, though not surprised, by the prevalence of security-related themes throughout the event. Many of the discussions among presenters and attendees centered on topics such as ransomware, identity…

Archive

Follow Us