Company + Product

Company + Product

Kickstart Amazon Bedrock with Auth0 by Okta

What’s the best way to bring generative AI to your products and services? If you’re lucky enough to have a few billion dollars lying around, your launch deadline is a handful of years away, and you have access to the world’s best artificial intelligence (AI) engineers, then you’re all good. You can create your own generative AI foundational model…

Okta unveils responsible AI principles

We at Okta are striving to safely use and develop artificial intelligence (AI) to strengthen the connections between people, technology, and our community. When it comes to AI innovation, we aim to live our core values and harness the power of AI in a way that reflects said values. This kind of thinking is part of our DNA. That’s why we’re pleased…

New Okta and Yubico integration delivers phishing-resistant authentication at enterprise scale

In October 2023, Okta and our integration partner Yubico jointly announced Yubico FIDO Pre-reg, which delivers pre-enrolled YubiKeys for phishing resistance and a streamlined passwordless onboarding experience for enterprises. Following several months of Early Access to select customers and continued investments, this first-to-market service will…

Fine Grained Authorization: A flexible solution for all

Authorization is evolving. Users demand more nuanced access controls and privacy, while security and compliance teams need precise permission management. Enter a new approach: Okta Fine Grained Authorization. Now, you can manage your teams’ need for precise permissions while maintaining independence from any Identity provider (IdP), including but…

Customize signup and login with Forms, Okta’s no-code extensibility feature now Generally Available

In today’s fast-paced digital world, adaptability and efficiency are key. The challenge for many businesses is balancing technical flexibility with evolving business needs. We’re excited to announce that Forms is now Generally Available. This powerful feature within Okta Customer Identity Cloud’s extensibility offering is set to transform how…

Tools for detecting and responding to potential threats post authentication

If a data breach happens at your organization,  you can’t afford to compromise on the speed and efficacy of your response. For the best possible defense against cybersecurity threats, security leaders need a comprehensive approach to Identity-powered security that supports risk mitigation in scenarios when would-be attackers have already exploited…

Tools for enforcing authentication policy

As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.  Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…

Archive