Okta

Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Western Union on Oktane: Looking to the Future and the User

The countdown to Oktane14 has begun! In the next few weeks, we’ll be sharing guest posts from our amazing customers about their experiences at Oktane and why they’re looking forward to this year’s conference. Follow along on the Okta blog and on Twitter with ...

Getting the Most Out of the Cloud: Webcast with Okta, Netskope, Box and Universal Music Group on Thursday, June 26

It’s a wild, wild world when it comes to enterprise technology right now. Vendors are promising “faster, better, cheaper” versus the traditional systems of record, and analysts are constantly chattering about the “hypergrowth” of new technologies grabbing more IT spend globally. And with systems now ...

Cloud Framework Panel Recap: "Started From the Bottom, Now We're Here"

It’s not every day that a panel we’re involved in will prompt coverage with Drake lyrics. And yet, just that happened last week after our CSO David Baker participated in a panel on the ‘New Cloud Framework’ with executives from Druva, Birst and CipherCloud.

...

Building Trust and Security Through Transparency of Service

Transparency is a great way for cloud providers to demonstrate and prove good security practices to their customers. Often times, however, the transparency stops when outages or service hiccups occur. During an incident, how a cloud provider communicates to its customers says a lot. In a guest post for...

Encryption in the Spotlight due to Vulnerable Android Apps

Last week, Ars Technica’s Dan Goodin published a story detailing how downloaded Android applications have the potential to expose the sensitive personal data of more than 185 million users. Vulnerabilities due to inadequate or incorrect use of SSL/TLS protocol libraries expose everything from online banking and social networking...

Defining the Enterprise Cloud Service – Part 6: Strong Encryption Throughout

During the past few weeks, I’ve written about what it takes to build a cloud service that’s ready for the enterprise. Essentially, there are three characteristics that set true enterprise cloud services apart from their consumer counterparts: Security. Reliability. Trust. When evaluating an enterprise cloud service for those characteristics, there...

Defining the Enterprise Cloud Service – Part 3: Benchmarked and Audited Service

I recently released the first and second installments of a six-part blog series about what it takes to have an enterprise-ready cloud service. While the identity hack of Wired’s Mat Honan (and the media fallout that followed) spurred the idea, the focus is...

Defining the Enterprise Cloud Service

The barrage of articles and blogs that cropped up following the personal identity hack on Wired ’s Mat Honan got me thinking about the importance of security in the cloud. In my experience, what happened to Mat is not a unique issue. In fact, it’s...

Keeping You Safe in the Cloud is a Full-Time Job

Identity is at the center of cloud security. As a result, cloud identity and access management (IAM) is one of the most interesting – and critical – challenges in IT today. The rapid evolution of enterprise IT to the cloud has rendered on-premise identity solutions ineffective. With the acceleration of...