workforce identity

Okta Privileged Access is generally available

We are thrilled to announce the general availability of Okta Privileged Access, our new privileged access management (PAM) offering, beginning this week. Okta Privileged Access is a powerful solution that elevates your security infrastructure and helps provide controlled access to your critical systems, applications, and data. This empowers your…

Behind the scenes at Access Requests: Worker tasks

Image generated using DALL-E Background Okta’s inbox platform supports various products in Okta’s Workforce Identity Cloud, where human input is required. It is most notably instrumental in the Access Request flow of Okta Identity Governance. A lot of what we do is trigger-based. These triggers can be a human action — “grant access when the…

Why now is the time for IAM transformation in banking

We’ve hit a tipping point in the battle between traditional financial institutions (TradFi) and financial technology (fintech) disruptors. Digital banking (led by fintech) has become ubiquitous, with nearly universal adoption —  eight in 10 consumers now use some type of digital financial tool, and half of Americans use fintech tools on a daily…

Jamf and Okta: Identity management that innovates with Apple

If you don’t know already Jamf, a leading Apple device management and endpoint security solutions provider, has teamed up with Okta to introduce public support for Apple’s Platform Single Sign-On (PSSO) framework on macOS, representing the first large-scale offering to the market. PSSO, which Apple showcased at WWDC 2022, provides a seamless and…

What the GenAI paradigm shift means for Identity

Generative AI is the biggest technology paradigm shift of our generation. As a technologist at heart, I couldn’t be more thrilled about its potential.  Here’s how I’m thinking about identity’s role in the AI future, AI’s impact on the threat landscape, Okta’s AI capabilities, and what’s coming next for Okta and AI at Oktane. The role of Identity…

Okta’s enhanced smart card auth helps keep gov resources safe

Nearly two decades ago, the U.S. Homeland Security Presidential Directive 12 (HSPD-12) established a new identity policy for federal employees and contractors. Its goal was a strong, government-wide approach to secure both physical and logical access. Today, the Personal Identity Verification (PIV) and Common Access Card (CAC) standards are…

Why we sunset the Okta Verify watch app

In the most recent version of Okta Verify for iOS (8.2), we decided to sunset the companion watch app. This blog aims to explain our thinking and share knowledge. Watch apps are cool. Pulling out your phone to accept an MFA push notification is not a great experience. Why would anyone sunset such great functionality? In a nutshell, you don’t need…

Okta Device Access: Identity-powered security starts at power up

For over a decade, Okta has led the way companies access data and apps in the cloud, allowing organizations to securely transform into modern digital businesses. As we continue to innovate to protect our customers from identity threats like the rise of phishing attacks, we need to ensure they can harness the same technology to secure access at any…

New report reveals trends in secure sign-in

There’s a popular business adage that we’ve found to be pretty credible: “You are what you measure.” No matter how well you may think you understand your customers or your industry, you won’t know for sure until you dig into the data.  At Okta, we’ve seen our users opt for ever more robust sign-in solutions over the past 14 years. But what’s the…

Archive