Identity and Access Management

Identity and access management (IAM) tools connect users to the systems and tools they rely on, easing experience for users, menial tasks for IT, and security for both. As the leading provider of identity for the enterprise, Okta has much to say about IAM. Here’s a sample of our thoughts.

Okta + Unicon: Enhancing Success and Security for Campus Communities

Many of today’s colleges and universities still rely on costly, outdated legacy systems to provide students, staff, and alumni with access to their resources—severely impacting user experience as a result. However, in the same spirit of continuous improvement these schools use to educate their students, that trend is shifting: 62% of education…

A Leading Identity Conference: What to Expect at Oktane20

Update: March 5 Every year at Oktane, we look forward to bringing together thousands of IT professionals, product leaders, and developers to discuss the importance of identity. As we’ve followed the spread of the coronavirus disease 2019 (COVID-19), it became clear that, this year, the best way to safely engage with our community is through a…

How to Enforce Least Privilege Access on Linux Servers Using Sudo

Security is and should be outcome-oriented. In that spirit, access management can be boiled down to a single phrase—ensuring that only the right people have the right levels of access to the right resources under the right conditions at the right time. In a true Zero Trust world, granting access through the front door isn’t enough, you also need…

5 Reasons You Want an Out-of-the-Box Identity Service

Whether you’re building a new app or migrating a legacy app to the cloud, you face a choice: build everything in-house or selectively use out-of-the-box services to make the job easier and faster. Out-of-the-box services like Twilio, for messaging, and Braintree, for payments, have gained popularity because they help lean dev teams remain agile…

4 Tools to Keep in your Risk-Assessment Toolbox

As more companies move to support cloud-based environments to work with better mobility and flexibility, their number of vulnerability points also increase. A thriving underground economy that trades in hacking tools, cyber crime services, stolen data, and credentials is estimated to be worth $600 billion annually—that’s more than the film, gaming…

The Importance of SSO in Enterprise IAM

In today’s identity management climate, single sign-on (SSO) capability is critical to the success of enterprise identity and access management (IAM). IT departments face growing demands: managing thousands of users, both internal and external, who each need access to an increasing number of cloud-based applications. Adding to this complexity is…

Archive