Okta Privileged Access

Okta Identity Security Posture Management and Workflows: Automated detection and remediation of local accounts

In a previous blog about Okta Identity Security Posture Management, we discussed the challenges and potential solutions that enterprises face when dealing with local account management and security. Today, we’ll look into an example of a solution for security teams, regardless of the application that creates local users. What we’ll explain is…

Tools for enforcing authentication policy

As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.  Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…

Fine Grained Authorization and new Okta Privileged Access features: The latest in Okta product capabilities

Welcome back to Okta’s Quarterly Release Overview! We’re excited to showcase our Q1 innovations from January–March. Dive into the latest capabilities, including Fine Grained Authorization, new Okta Privileged Access and Okta Identity Governance capabilities, and more. Okta is the World’s Identity Company. We free everyone to safely use any…

Okta Privileged Access and simplified developer experiences: The latest in Okta product capabilities

Welcome back to Okta’s Quarterly Release Overview! 2023 has come to an end, and we’re excited to showcase all of our Q4 innovations from October–December. Dive into the latest capabilities, including Okta Privileged Access (OPA), heightened security with phishing-resistant capabilities, and powerful integrations to extend Okta Identity processes…

Okta Privileged Access is generally available

We are thrilled to announce the general availability of Okta Privileged Access, our new privileged access management (PAM) offering, beginning this week. Okta Privileged Access is a powerful solution that elevates your security infrastructure and helps provide controlled access to your critical systems, applications, and data. This empowers your…

Strengthen AWS Security with Okta Privileged Access

As cyberthreats continue to rise and businesses increasingly migrate to the cloud, safeguarding sensitive assets is paramount. Ensuring the protection of sensitive data has become a top priority for every kind of organization. privileged access management (PAM) and cloud infrastructure entitlements management (CIEM) emerge as crucial security…

Archive