Technology

Technology

What Could a Passwordless Workplace Look Like?

Passwords have been a constant throughout our digital “coming of age”. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources. Passwords are so deeply ingrained into our web apps and accounts, it can be challenging to imagine…

Modernizing to the Cloud: How to Support a Hybrid IT Model

The proliferation of cloud-based services is not only transforming our society, but it’s redesigning the very fabric of our economy as well. Organizations are observing this pattern globally, and the potential business benefits are clear to them. As a result, cloud computing is rapidly reshaping IT strategy; it is no longer a question of whether…

What is ADFS?

Active Directory Federation Services (ADFS) is a Single Sign-On (SSO) solution created by Microsoft. As a component of Windows Server operating systems, it provides users with authenticated access to applications that are not capable of using Integrated Windows Authentication (IWA) through Active Directory (AD). Developed to provide flexibility,…

Understanding MFA Factors: You’re Not Using the Right Ones

With the rise in both the number and sophistication of today’s security threats, the benefits of multi-factor authentication (MFA) have become widely recognized, leading to increased adoption across enterprise and consumer apps . From a security standpoint, this is all good news. We know that passwords alone are not enough to secure your data, and…

Contextual Access Management: What Does It Actually Mean?

Today’s teams get the job done from wherever they need to and on whichever device they prefer. Their workplace may be within the traditional office environment, but it can also be at home, in a coffee shop, at a client site, or even a combination of these on any given day. The range of endpoints teams use—whether a laptop, a tablet, a mobile phone…

What is Secure Customer Identity (aka User Management)?

In the modern app ecosystem, virtually every application leverages identity to provide customized and secure user experiences. Customer identity and access management (CIAM), also known as secure user management, or secure customer identity, is the system an application deploys to determine who a user is, and what information they have access to…

Managing the Risks of Contract ​Employee Onboarding

As a growing company, you have part-time employees, seasonal interns, partners, and contractors who all require access to your corporate apps and data. With these users coming and going at different times, and potentially spread across different departments and geographies, it’s easy to lose track of permissions and whose access must be revoked…

How to Avoid the Complexities of Traditional M&A with Okta

In today’s competitive environment, we often see companies expand their market share via mergers & acquisitions. A clear vision for planning identity and access management during an M&A transaction is critical to ensure success. However, the technical challenges that come with a standard M&A project – things like domain consolidation,…

Innovating Identity on the Blockchain

The blockchain is frequently referred to as the technology that will disrupt, transform and reimagine how things are done today. To date, the most successful application of the blockchain is digital currency, especially Bitcoin. The Bitcoin phenomenon started in 2008 and the Bitcoin blockchain has operated without significant disruption since…

Archive