August 28 - 30 | Las Vegas

Okta

Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Our Enduring Identity

Read More

Part Three: Bug Bounty  Programs —  Is Your Organization Ready?

Read More

Unveiling our Oktane17 keynote speakers

Read More

Introducing our "Identities" Series

Read More

How to Communicate the Value of Identity Management Solutions to Key Stakeholders

Read More
#LifeAtOkta
Technology
Partners
Company + Product
Customers + Partners
Industry Insight

InfoSec

Getting the Most Out of the Cloud: Webcast with Okta, Netskope, Box and Universal Music Group on Thursday, June 26

It’s a wild, wild world when it comes to enterprise technology right now. Vendors are promising “faster, better, cheaper” versus the traditional systems of record, and analysts are constantly chattering about the “hypergrowth” of new technologies grabbing more IT spend globally. And with systems now ...

Building Trust and Security Through Transparency of Service

Transparency is a great way for cloud providers to demonstrate and prove good security practices to their customers. Often times, however, the transparency stops when outages or service hiccups occur. During an incident, how a cloud provider communicates to its customers says a lot. In a guest post for...

Defining the Enterprise Cloud Service – Part 6: Strong Encryption Throughout

During the past few weeks, I’ve written about what it takes to build a cloud service that’s ready for the enterprise. Essentially, there are three characteristics that set true enterprise cloud services apart from their consumer counterparts: Security. Reliability. Trust. When evaluating an enterprise cloud service for those characteristics, there...

Keeping You Safe in the Cloud is a Full-Time Job

Identity is at the center of cloud security. As a result, cloud identity and access management (IAM) is one of the most interesting – and critical – challenges in IT today. The rapid evolution of enterprise IT to the cloud has rendered on-premise identity solutions ineffective. With the acceleration of...