Okta Partners

Okta and AWS Partner to Secure EC2 Instances with the Okta Advanced Server Access Quick Start

Millions of companies – including many Okta customers – rely on Amazon Web Services (AWS) to power their businesses. According to 2020's [email protected] Report, AWS has risen steadily from sixth place five years ago to the second most popular cloud app used by Okta customers. As companies increasingly use AWS to power their infrastructure, they…

Founders in Focus: Matthew Carroll of Immuta

Welcome to our Founders in Focus series, where each month we highlight one of the founders of Okta Ventures’ portfolio companies. You’ll learn more about them and how they work with Okta. This month we’re speaking with Matthew Carroll, CEO and co-founder of Immuta. What is Immuta and what is your mission? Immuta’s mission is to enable…

Material Security: Extending Zero Trust to Email

Historically, many CISOs and C-Suite executives have regarded email as an avenue for attack rather than an actual target (when, in fact, it’s both). But while they considered email security a “solved problem,” large-scale email-based attacks from recent years have proved otherwise. The truth is that the problem of email security is active and…

Okta Joins the ID2020 Alliance

If you’re reading this on any kind of digital device, you probably use various forms of digital identity on a regular basis. From accessing healthcare to participating in democracy to protecting our finances, modern life requires identity.  For most of us, it’s impossible to imagine how we’d live our lives without verifiable identification. Yet,…

Unified Identity Is The New Perimeter

Executive summary The lines between users inside and outside your organization are blurring. Modern organizations are finding it advantageous to consolidate and simplify Identity structures to provide all users the information they need, where and when they need it. SecureITsource and Okta have partnered to take a closer look at real customers and…

Okta + Proofpoint: Uniting People-Centric Security and Identity to Protect Users Against Phishing

Today’s cyber-attacks target people, not infrastructure. Threats are constantly evolving to target the weakest point in an organization's attack surface– the end user. In fact, more than 90% of advanced threats target users through email. Not only that, but the growth of remote workers introduces more security risk than ever before as users…

Archive