Company + Product

Company + Product

Leveling up: Achieving Okta professional certification

I have been at Okta for over a year, and as someone working in identity and access management (IAM), it was time to earn my Okta certification. I knew getting certified would help validate my skills, and to be completely honest, as I started to see all my colleagues get Okta certified, I felt a little FOMO. Here’s a look at my experience — from…

Device flow and Okta: Shared device authentication for consumers

Authentication with shared devices comes with a unique set of challenges. Some scenarios are specific to an organization's workforce whereas some use cases are consumer specific. In this article, I will focus on the consumer scenarios, and explore the challenges and possible options to address shared device authentication securely. Challenges with…

Identity Threat Protection with Okta AI 

Real-time, inline protection that keeps pace with your business Today's complex Identity threat landscape demands streamlined security practices and an evolving, multi-layered defense-in-depth strategy to identify and mitigate cybersecurity threats. Okta’s comprehensive security strategy addresses these threats at multiple levels, including at the…

Securing privileged Active Directory accounts with Okta

In today’s hybrid IT landscape, Active Directory (AD) remains a cornerstone for Identity management. However, privileged AD accounts present a significant security risk if not managed properly.  That’s why we’re pleased to announce that AD integration with Okta Privileged Access is now available in Early Access. With this feature, organizations…

Launch Week ‘25: Showcase edition

Innovation never stops, and neither do we. As cyberthreats evolve, Identity remains the first line of defense. That’s why, during this Launch Week, we’re unveiling the latest advancements in Identity Security — designed to streamline access management and deliver seamless, secure experiences.  Whether you’re securing your workforce, customers, or…

Stay secure with FastPass and Trusted App Filters

Phishing resistance first Phishing-resistant authentication is the current baseline for secure authentication, which means FIDO/WebAuthn, FastPass, PIV/CAC, etc. This post will focus on how those already meeting this baseline can take security to the next level. Passwords, SMS, push notifications, and one-time codes are vulnerable to much less…

Archive