Okta Gives You Freedom and Flexibility—Here’s How

In today’s digital environment, identity is at the center of everything. That’s why we’ve made it our mandate to provide customers with an identity platform that gives them the freedom and flexibility to choose. Our goal is to enable organizations so that they can securely adopt best-of-breed technologies, retire cumbersome, legacy systems, and…

Modernizing Government Agencies: Delivering Frictionless Experiences to Citizens, Quickly and Securely

Doing our errands looks a lot different now than it did a few years ago, and not just because of the COVID-19 pandemic (though that has certainly accelerated things). For a while now, we’ve been ordering groceries online, paying bills on a banking app, and even checking in with our doctor from the comfort of home. With so many digital experiences…

Founders in Focus: Bob Moore of Crossbeam

Each month we highlight a founder of an Okta Ventures portfolio company so you get to learn more about them and how they work with Okta. This month we’re speaking with Bob Moore, founder of Crossbeam. What is Crossbeam and what is your mission? Crossbeam is a partner ecosystem platform. We act as a data escrow service that finds overlapping…

Key Steps for Optimizing Full-Circle Identity Processes

Our last post on identity lifecycle management (LCM) covered common scenarios and actionable tips for perfecting your approach to managing identity data. This week, we’ll review some recommendations for automating employee lifecycle tasks surrounding what’s commonly referred to as “joiner, mover, leaver” (JML) processes. Many IT teams struggle…

How to Meet your PCI DSS Targets with Okta

Did You know that the most common type of identity theft is debit and credit card fraud? According to the Federal Trade Commision, the rate of card fraud more than doubled between 2017 and 2019 with more than 270,000 reports in 2019 alone.  The Payment Card Industry Data Security Standards (PCI DSS) were introduced to help businesses to prevent,…

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorization credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe? …

Archive

Follow Us