Okta Identity Threat Protection

Tools for detecting and responding to potential threats post authentication

If a data breach happens at your organization,  you can’t afford to compromise on the speed and efficacy of your response. For the best possible defense against cybersecurity threats, security leaders need a comprehensive approach to Identity-powered security that supports risk mitigation in scenarios when would-be attackers have already exploited…

Identity Threat Protection with Okta AI

…now Generally Available A matter of Identity Security In today’s increasingly cloud-based world, Identity is the first, and in many cases, only persistent fingerprint enabling a user’s access to assets in the organization. As the control plane, Identity spans across the enterprise IT tech stack and intersects the data or access planes of device,…

Launch Week: What’s new for Okta EMEA in Q2

Because the Identity threats are always evolving and multiplying, everyone at Okta continuously strives to make our software and solutions better. We have teams of engineers dedicated to a long list of exciting features and improvements — so many improvements, in fact, that we’ve had to find a new way to tell you about them.  That’s why we’ve…

How AI impacts the SMB threat landscape

Artificial intelligence (AI), and specifically generative AI (GenAI), is helping jumpstart revolutions in various industries. Unfortunately, some of this technology’s earliest and most aggressive adopters have been cyberattackers. The exponential growth in GenAI capabilities has proven irresistible, allowing even novice criminals to conduct…

Archive