Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Why It’s Time to Break Up with Active Directory

Read More

Onward and Upward: Okta Named a Leader in Gartner’s Magic Quadrant for Access Management 2019

Read More

Best-of-Breed vs. Suites: Growth of Slack and Zoom Across the Okta Integration Network

Read More

The Production Line: The LDAP Interface

Read More
#LifeAtOkta

Compliance

Privacy

Research

Management

Technology
Partners
Company + Product
Customers + Partners
Industry Insight

InfoSec

What Is Social Login and Is It Worth Implementing?

Social login , also known as social sign-in or social sign-on, uses information from social networking sites to facilitate logins on third-party applications and platforms. The process is designed to simplify sign-in and registration experiences, providing a convenient alternative to mandatory account creation.

For users , social...

What Is Spear Phishing?

Spear phishing is a form of cyber attack targeted at a particular person or small set of individuals. In these scams, bad actors research their chosen targets and attempt to convince them to surrender sensitive data or financial information. Spear phishing attacks may also aim to infect user devices...

What Is Data Theft?

Data theft is the act of stealing information stored on corporate databases, devices, and servers. This form of corporate theft is a significant risk for businesses of all sizes and can originate both inside and outside an organization.

The term data theft can give the...

How the CEOs of Okta, Zoom, Slack, and Box are Leading Through Crisis and Creating a New Normal

Between COVID-19, overdue conversations around racial injustice, and businesses transitioning to distributed work, this year has presented us with multiple crises, but also opportunities for change.

Navigating through these crises towards a “new normal” demands steady leadership. Technology leaders today find themselves sharing responsibility for...