access management

Okta Identity Governance: Modern, Cloud-Based IGA

Since the 2000s, companies have turned to Identity Governance and Administration (IGA) software to achieve automation and compliance outcomes. But the traditional IGA systems we’ve come to know have been costly, complex, and designed for on-premises applications and infrastructure. They simply don’t meet the needs of today’s dynamic, remote…

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

Okta + Unicon: Enhancing Success and Security for Campus Communities

Many of today’s colleges and universities still rely on costly, outdated legacy systems to provide students, staff, and alumni with access to their resources—severely impacting user experience as a result. However, in the same spirit of continuous improvement these schools use to educate their students, that trend is shifting: 62% of education…

When to Retire the Monolith: Is a Move to Microservices in Your Future?

We’ve seen monumental changes in personal computing over the past few decades. The more sophisticated a device becomes, the more compact its design and the more advanced its capabilities. Take mobile phones: their first iterations were cumbersome and slow compared to the sleek, fast smartphones we now carry in our pockets. And modern-day laptops…

Understand Web Access Management—Then Move On

Figuring out how to secure users’ connections to applications is an age-old challenge that has developed alongside the digital transformation of the enterprise. Traditionally, businesses have addressed this issue with complex authorization systems, many of which used web access management (WAM)—or on-premises single sign-on (SSO)—at the center of…

No One Out-Executes Us: Okta Named a Leader in Gartner’s Magic Quadrant for Access Management, Worldwide 2018

This week, Gartner released its second Magic Quadrant for Access Management, Worldwide, and Okta was once again named a Leader. We placed highest in “ability to execute” in the report, a recognition we also held last year. We’re proud of this achievement and we view it as a testament to our commitment to our customers’ success and our innovation…

Contextual Access Management: What Does It Actually Mean?

Today’s teams get the job done from wherever they need to and on whichever device they prefer. Their workplace may be within the traditional office environment, but it can also be at home, in a coffee shop, at a client site, or even a combination of these on any given day. The range of endpoints teams use—whether a laptop, a tablet, a mobile phone…

Okta​ ​Today​ ​and​ ​Tomorrow:​ ​Going​ ​Beyond​ ​Internal​ ​Access​ ​Management

Here at Okta, we recently carved out core enhancements across four major components our the product, which we shared at Oktane17 in August. Your identity solution needs to be future-proof – connecting to everything you need today and backed by a team that will ensure it connects to the apps, devices, and tools your team will need in future as well…

Furthest in Execution: Okta Named a Leader in Gartner’s Inaugural Magic Quadrant for Access Management

This week, we were recognized as a Leader in the debut of Gartner’s Magic Quadrant for Access Management, Worldwide 2017. We’re proud to be placed highest on the ability to execute axis of all 15 companies evaluated. For more on why, you can find a copy of the report here. The Leader in Execution Gartner previously evaluated Okta in its “Magic…

Archive