Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

What is Zero Trust Security?

Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. In a Zero Trust model, people are the new perimeter, and identity is the core of maintaining a secure environment....

Okta Releases FIPS 140-2 Validated Encryption in Okta Verify

Credential phishing is a real and growing threat, and multi-factor authentication (MFA) is an effective protection against it. The strength of MFA lies in its requirement to present additional valid factors, beyond a password, to gain access, thwarting would-be attackers. But not all factors are created equal.

Some factors,...

Using SIEM and Identity to Protect Against Data Breaches

“We are what we repeatedly do“ is a common paraphrase of Aristotle—though if he were around today, his sentiment might be more like “we are what we search, click, or connect to.” As security professionals well know, there’s a lot to learn from how we use technology.

The interactions...

User Management: Designing for Security

At Okta, we see our customers deploy and build a broad range of customer-facing apps. Commonly, these apps support differing audiences, often reflected as segments within a single company, identities across customer companies, or users that span into partner organizations.

Which begs the question: how to centrally manage these...

How Modern Identity Drives IoT Adoption

The IoT (Internet of Things) is made up of three elements:

Things that are embedded with sensors The networks that connect them The systems that process data to or from the things

Today’s IoT verticals include: healthcare, life sciences, smart home, consumer, infrastructure, transport, urban mobility, and industrial...

Configuring Progressive Profiling for Your Custom Apps

At Okta, we see our customers deploy and build a broad range of customer-facing applications. At times, the completeness of a user profile may vary, depending on what is initially known about the user and any additional information that accrued over time. Progressive profiling is used to incrementally collect profile...

Understanding FIDO Standards: Your Go-To Guide

FIDO is an acronym that comes from the Latin fido, meaning ‘to trust’, which was popularised by Abraham Lincoln—who borrowed it to name his dog. It’s a fitting name for man’s best friend, and just as appropriate in the security world, where trust is key.

A more technical reference,...