IAM

Identity and access management (IAM) tools connect users to the systems and tools they rely on, easing experience for users, menial tasks for IT, and security for both. As the leading provider of identity for the enterprise, Okta has much to say about IAM. Here’s a sample of our thoughts.

Is Establishing a Robust IAM Practice Tactical or Strategic?

Verizon’s 2021 Data Breach Investigations Report found that privilege abuse is still the leading cause of breaches today. As cyber-attacks targeting identity (such as business email compromise or phishing) have become more sophisticated and numerous, many organizations are increasing their focus and budgets to combat them using Identity and Access…

What Is Identity and Access Management (IAM)?

Identity and access management (IAM) is a framework that enables organizations to ensure only the right people and devices have access to the right applications, resources, and systems at the right time. IAM encompasses the various policies, services, and technologies that allow organizations to verify every user’s identity and level of access at…

What Is Single Sign-On (SSO)?

Single sign-on (SSO) is a user authentication tool that enables users to securely access multiple applications and services using just one set of credentials. Whether your workday relies on Slack, Asana, Google Workspace, or Zoom, SSO provides you with a pop-up widget or login page with just one password that gives you access to every integrated…

“We wanted to help more organizations succeed.” Leon Oud Shares the Vision Behind FuseLogic, Okta’s Most Certified Partner in the Benelux

IT leaders know that the best and most up-to-date technologies can make a sizeable impact on their business results. But being on the cutting edge brings its own challenges: from creating and changing users in a wide array of applications, to ensuring the security of apps they may not have full control over – particularly when, confronted with…

Take Back Control of Your Business Data with Okta and 1Password

Single Sign-On (SSO) is a key component of any Identity & Access Management (IAM) stack, but it is only one piece of a much larger security puzzle. In order to secure your business’ data, you need to manage access to all services, not just those covered by SSO.  Shadow IT is the chink in your security armor Employees often break IT rules…

What is Decentralized Identity?

Decentralized identity, often used interchangeably with “self-sovereign identity” (SSI), is gaining ground as an alternative to today’s centralized and federated infrastructures. In short, it allows individuals to manage their own identities. In a decentralized framework, the user receives credentials from a number of issuers (e.g., government,…

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

Archive