Customer Identity Cloud enhancements to prevent account takeover

Recapping features introduced under the Okta Secure Identity Commitment to safeguard our infrastructure, our customers, and our customers’ customers Identity is under attack — by ransomware groups, nation-state actors, malicious insiders, and other cybercriminals — and, in recent years, it has emerged as the primary enterprise security entry point…

Customer Identity Cloud and accessible authentication

At Okta, we endeavor to build a world where everyone can safely use any technology, powered by their identity. Our definition of “everyone” includes people who rely on assistive technology to access and engage with digital products, services, and applications.  This May 16th, Okta joins our partners, customers and the world in acknowledging Global…

Inside Okta’s new brand campaign

Imagine if you were free. Free from the old ways of doing things. From outdated tools and inefficient workflows, from forgotten passwords and frustrated IT teams. Free from the burdens of bad actors, painful user experiences, and costly security breaches. What if you were free from all that? What would you focus on instead? What impossible things…

Founders in Focus: Emanuel Salmona of Nagomi Security

Each month we’ll highlight one of the founders of Okta Ventures’ portfolio companies. You’ll get to know more about them and learn how they work with Okta. This month we’re speaking with Emanuel Salmona of Nagomi Security. What is Nagomi Security, and what is your mission? Nagomi Security is changing the way security teams balance risk and defense…

Ready to deliver better customer experiences? No-code Identity orchestration is your answer

Call it an ace in the hole, a linchpin, or the “secret sauce,” but that’s what extensibility is. It’s the key to ensuring adaptability and scalability in an ever-evolving digital landscape.  Today, we’re excited to share the latest innovation for the Customer Identity Cloud Actions platform: Forms for Actions. We designed this new no-code visual…

Navigating credential and fraud risks: The phishing resistance authenticator effect

Image generated using DALL·E 2   This blog explores the robust security benefits of phishing-resistant authenticators, which can significantly bolster an organization’s cybersecurity measures beyond the scope of phishing attacks. The percentage of phishing-resistant authentications serves as a tangible indicator of an organization’s proactive use…

Build your app or service right from the get-go

Save with an Identity solution that won’t slow you down as you scale TL;DR Don’t want to add another web page to the to-read list? We have an easy, on-the-go version here available for immediate download.  The process of building up your app or service involves not just, well, building the app or service, but also the foundational tech you need…

Archive

Follow Us
Share on Linkedin Share on Youtube