Industry Insight

Industry Insight

Okta and AWS Partner to Secure EC2 Instances with the Okta Advanced Server Access Quick Start

Millions of companies – including many Okta customers – rely on Amazon Web Services (AWS) to power their businesses. According to 2020's Businesses@Work Report, AWS has risen steadily from sixth place five years ago to the second most popular cloud app used by Okta customers. As companies increasingly use AWS to power their infrastructure, they…

Empowering Every Organization with Identity

I’ve spent my first few months at Okta listening and learning from the incredible employees, customers, and partners who deeply care about identity and its potential to bring simple, secure access to everyone. On this journey, I’ve come to believe more than ever that identity has a foundational role to play in the business transformations of today…

Founders in Focus: Matthew Carroll of Immuta

Welcome to our Founders in Focus series, where each month we highlight one of the founders of Okta Ventures’ portfolio companies. You’ll learn more about them and how they work with Okta. This month we’re speaking with Matthew Carroll, CEO and co-founder of Immuta. What is Immuta and what is your mission? Immuta’s mission is to enable…

Material Security: Extending Zero Trust to Email

Historically, many CISOs and C-Suite executives have regarded email as an avenue for attack rather than an actual target (when, in fact, it’s both). But while they considered email security a “solved problem,” large-scale email-based attacks from recent years have proved otherwise. The truth is that the problem of email security is active and…

What Are the Benefits and Limitations of Multi-Cloud?

Organizations are increasingly deploying and implementing cloud services in an effort to reduce the cost and complexity of their infrastructure while accelerating their innovation levels. And this is typically a multi-pronged approach: 92% of enterprises have deployed a multi-cloud strategy, while 80% deploy a hybrid cloud strategy. The average…

Okta Joins the ID2020 Alliance

If you’re reading this on any kind of digital device, you probably use various forms of digital identity on a regular basis. From accessing healthcare to participating in democracy to protecting our finances, modern life requires identity.  For most of us, it’s impossible to imagine how we’d live our lives without verifiable identification. Yet,…

CCPA vs. GDPR: Similarities and Differences Explained

The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are laws that emerged to give individuals greater power over their personal information. Both regulate organizations that collect and use data in a variety of ways. A brief summary of the CCPA: Gives California residents increased transparency and control…

Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?

Being authentic is a high term of praise—if we think people are authentic, we believe them to be trustworthy, loyal, and dependable. There's a similar concept in computer security. Business networks are crucial to protect, so firms want only authorized people accessing them. In cybersecurity, authentication means verifying that a person or device…

What is a Domain Name System (DNS)?

What Is the Domain Name System (DNS)?  The domain name system (DNS) makes it possible for browsers, apps, and servers to load internet resources. Think of it like a phonebook—except instead of associating a person’s name with a phone number, it maps a domain name (e.g., okta.com) to an internet protocol (IP) address that can be understood by…

What Are Containers?

Container technology—often referred to simply as “containers”—is a mechanism for packaging an application so that it can run in isolation from other processes. Getting their name from the shipping industry, containers are units of software, made up of code and dependencies, that enable applications to run quickly, reliably, and uniformly,…

Archive