IAM

Identity and access management (IAM) tools connect users to the systems and tools they rely on, easing experience for users, menial tasks for IT, and security for both. As the leading provider of identity for the enterprise, Okta has much to say about IAM. Here’s a sample of our thoughts.

What is Decentralized Identity?

Decentralized identity, often used interchangeably with “self-sovereign identity” (SSI), is gaining ground as an alternative to today’s centralized and federated infrastructures. In short, it allows individuals to manage their own identities. In a decentralized framework, the user receives credentials from a number of issuers (e.g., government,…

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

Trailblazing Okta Distributor Distology is Helping Partners Thrive in a Fast-Changing World. Here’s How

As spending in the global cybersecurity market continues to increase, so does the number of organizations, tools, professionals, products, developers, and partners offering security solutions. Even for professionals, choosing the right one can be a daunting task. That’s why IT distributor Distology takes matters into its own hands, continually…

Oktane20 Live: Identity Stories, Straight From Our Customers

Nothing is more important than the health and safety of the Okta community, so Oktane20 is going virtual this year—available to anyone, free of charge. We couldn’t be more excited to share our great lineup of speakers, trainings, and networking opportunities. Check out the full, updated agenda on oktane20.com. This year, former Secretary of State…

4 Tools to Keep in your Risk-Assessment Toolbox

As more companies move to support cloud-based environments to work with better mobility and flexibility, their number of vulnerability points also increase. A thriving underground economy that trades in hacking tools, cyber crime services, stolen data, and credentials is estimated to be worth $600 billion annually—that’s more than the film, gaming…

3 Top Enterprises Making IAM a Priority

To be competitive is to be proactive. Companies in every industry have to identify and address demands if they’re to get (and stay) ahead. Each company has its own challenges, but the need to modernize IT impacts organizations across all industries. A major part of this modernization is improved identity and access management (IAM). Companies need…

IAM—Who’s Ultimately Responsible?

It’s a familiar tale. HR wants to increase efficiency. Security needs to reduce the risk of a breach. Legal have their eye on safeguarding, and IT are swamped with reset requests. For modern businesses, a wide array of stakeholders have an interest in streamlining processes, protecting their people, knocking down the proverbial walls of the…

Archive