Company + Product

Company + Product

Okta Access Gateway + ThreatInsights = Protecting On-Prem Apps

At Okta, we love to secure access to everything from a single platform. This, of course, includes on-premises apps. As spoiled here, our specialists wanted to weigh in on how OAG is at its best when paired with the features that make up the Okta platform. In other words, we’re giving you the Secret Sauce! This month, Senior Solutions Engineer, Bob…

The Dogfooding Chronicles: Work From Home Edition

The Dogfooding Chronicles are BACK! And, like everyone else, we’re dogfooding from home these days. The move home has been a period of transition for everyone, but the one thing that wasn’t difficult? Getting the Okta workforce home and working—very quickly. And there’s no better Oktanaut to tell that story than our guest blogger Christopher Flynn…

99.99% Uptime For Every Customer

Identity has become a cornerstone of our digital lives, whether it’s through technology adoption at work, personal app usage at home, or anywhere in between. The fundamental role of identity manifests through nearly every person who connects to the internet, as each app, service, or tool needs to identify exactly who the user is. Reliable access…

Cloud-First Agility to Securely Remote Enable Your Workforce

In my previous blog, I introduced the concept of why hybrid, cloud-first, identity solutions are fundamentally different from those with an on-premises-first focus, providing you with a huge competitive advantage. Over the next few blog posts, I’ll be digging deeper into these differences, and detailing the advantages you’ll get by adopting Okta’s…

Roadmap: We’re Enhancing Okta Admin and End-User Experiences

At Okta, our goal is to empower any organization and any person to access any technology. To do that, enterprise IT tools need to be simple and seamless to use, and should deliver intuitive user experiences while remaining highly secure. With that in mind, we’ve introduced several major updates that will significantly enhance your admin and end…

Mapping the Journey to Universal Directory

Over the last couple of decades, companies have become accustomed to safely managing their users, groups, devices, and resources within the corporate network. Using enterprise directories, they have been able to define singular access policies that determine how employees and customers can access the apps and resources they need. But as they…

Archive