IAM

Identity and access management (IAM) tools connect users to the systems and tools they rely on, easing experience for users, menial tasks for IT, and security for both. As the leading provider of identity for the enterprise, Okta has much to say about IAM. Here’s a sample of our thoughts.

What Is Single Sign-On (SSO)?

Single sign-on (SSO) is a user authentication tool that enables users to securely access multiple applications and services using just one set of credentials. Whether your workday relies on Slack, Asana, Google Workspace, or Zoom, SSO provides you with a pop-up widget or login page with just one password that gives you access to every integrated…

“We wanted to help more organizations succeed.” Leon Oud shares the vision behind FuseLogic, Okta’s most certified partner in the Benelux

IT leaders know that the best and most up-to-date technologies can make a sizeable impact on their business results. But being on the cutting edge brings its own challenges: from creating and changing users in a wide array of applications, to ensuring the security of apps they may not have full control over – particularly when, confronted with…

Take Back Control of Your Business Data with Okta and 1Password

Single Sign-On (SSO) is a key component of any Identity & Access Management (IAM) stack, but it is only one piece of a much larger security puzzle. In order to secure your business’ data, you need to manage access to all services, not just those covered by SSO.  Shadow IT is the chink in your security armor Employees often break IT rules…

What is Decentralized Identity?

Decentralized identity, often used interchangeably with “self-sovereign identity” (SSI), is gaining ground as an alternative to today’s centralized and federated infrastructures. In short, it allows individuals to manage their own identities. In a decentralized framework, the user receives credentials from a number of issuers (e.g., government,…

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

Trailblazing Okta distributor Distology is helping partners thrive in a fast-changing world. Here’s how:

As spending in the global cybersecurity market continues to increase, so does the number of organizations, tools, professionals, products, developers, and partners offering security solutions. Even for professionals, choosing the right one can be a daunting task. That’s why IT distributor Distology takes matters into its own hands, continually…

Oktane20 Live: Identity Stories, Straight From Our Customers

Nothing is more important than the health and safety of the Okta community, so Oktane20 is going virtual this year—available to anyone, free of charge. We couldn’t be more excited to share our great lineup of speakers, trainings, and networking opportunities. Check out the full, updated agenda on oktane20.com. This year, former Secretary of State…

4 Tools to Keep in your Risk-Assessment Toolbox

As more companies move to support cloud-based environments to work with better mobility and flexibility, their number of vulnerability points also increase. A thriving underground economy that trades in hacking tools, cyber crime services, stolen data, and credentials is estimated to be worth $600 billion annually—that’s more than the film, gaming…

Archive