This is the third and final blog post in our Adapt to the Cloud Operating Model series.
With any organizational change that impacts people, process, and technology, it’s best to take it in stride. When talking with customers about their Zero Trust security initiatives, an analogy I often use is: “if Google’s BeyondCorp is the peak of Mt. Everest,…
Viruses, spyware, and other malware can affect more than just desktop computers and laptops. Mobile devices are vulnerable as well. As the threat landscape continues to evolve, it’s important that we not only understand these risks—but how we can protect ourselves against them.
In this post, we’ll take a closer look at the mobile phone security…
Zero Trust is a security framework based on the belief that every user, device, and IP address accessing a resource is a threat until proven otherwise. Under the concept of “never trust, always verify,” it requires that security teams implement strict access controls and verify anything that tries to connect to an enterprise’s network.
Coined in…
API is an acronym that stands for “application programming interface,” and it allows apps to send information between each other. While there are numerous protocols and technologies involved, the underlying purpose of APIs is always the same: to let one piece of software communicate with another.
APIs (sometimes described as web services) work in…
This is the second blog post in our Adapt to the Cloud Operating Model series.
Identity is at the heart of any organization; it forms the foundation for a productive and secure workforce, and it enables digital teams to build lasting and scalable customer experiences. In the cloud, identity isn’t just about people—it covers the full spectrum of…
If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like:
How do I keep my laptop secure in a public network?
What is the best security system for my computer?
Is my laptop password safe?
…
According to our Businesses @ Work Reports, Microsoft’s Office 365 has ranked as the #1 most popular application within the Okta integration network for the last few years — both by number of customers and by number of monthly active users.
Top apps by number of customers - Businesses @ Work 2020
Top apps by number of monthly unique active…
At Okta, trust and transparency are core to who we are as a company. These values critically inform the way we view our responsibilities to our customers and to the personal data of their users that they entrust to Okta.
The keystone of our transparency is providing our customers with a clear understanding of how we collect, process, and secure…
At the onset of the COVID-19 pandemic, we were told by health and government officials to stay home and stay safe. Ironically, when it comes to corporate technology, home is one of the least secure places we can be.
Allowing employees to work remotely can leave organizations susceptible to a number of security threats. And with the pandemic…
You know it, we know it: DevOps is a core function for any company that wants to deliver exceptional digital products to its customers. But as customers become used to rapid updates and new features from the applications they use every day, there’s an added pressure for your DevOps team to be continually innovating so that your business can do the…