Driving Digital Transformation in UK Healthcare and Pharma

Healthcare organisations (HCOs) and pharmaceutical companies have not always been first to the chase when it comes to embracing new technologies. However, in the UK this is changing, with a growing realisation that digital platforms can streamline processes, improve collaboration, reduce costs and empower patients. That’s led to an ambitious…

5 Ways to Continuously Mitigate Risk at Your Organization

We’re living in a landscape where risks are prolific, diverse, and often unanticipated. Organizations are under immense pressure to implement strong security measures and avoid cyber attacks from highly specialized threat actors looking to capitalize on the smallest oversight. In this post, we’ll look at some strategies you can leverage to manage…

Inside the Mind of the Modern Worker: Introducing People @ Work

The rise of new workplace technologies over the past decade has given way to a connected, digitally-savvy modern worker. And these new tools have completely shifted how those employees work — video conferencing makes remote days feasible, communication apps allow for 24/7 conversation with colleagues, and security solutions enable employees to…

Supporting the UK’s Ambitious Government Transformation Strategy

All over the world, governments are developing ambitious digital transformation strategies to provide better public services more efficiently and cost effectively. The UK government is no exception. In fact, it’s Government Transformation Strategy is one of the most far-reaching projects of its kind, aiming to use a £450m budget to save £3.5bn by…

How to Use Progressive Profiling as a Privacy Tool

User experience is top of mind for developers building customer-facing applications—and an important element of that is collecting user information. When developers avoid lengthy forms and overwhelming data capture as part of the onboarding process, users have a more seamless experience, right from the outset of using a new application. This…

Five Strategies to Simplify User Onboarding

Scaling organizations have a problem. While an influx of new employees is always reason to celebrate, it also comes with added management overhead as all the new users are onboarded onto the company’s applications and systems. As every ambitious company knows, IT’s time is best spent contributing to projects that will shape the future of their…

How 10 Years of Customer Feedback Has Influenced Okta's Products

For any business that began life as a humble startup, each year is a big deal—but when you hit your 10 year anniversary, it’s pretty surreal. We’ve learned a lot in 10 years; much of it thanks to our customers who have been our intrepid companions on this journey. To me, one of the most important changes we’ve made is how we understand our…

How to Use Feedback Loops to Find the Gaps in your Security Strategy

Organizations are under ever-greater pressure to leverage new app technologies to drive competitive advantage and growth. Yet these ambitious plans all come crashing down if they can’t guarantee that modern IT systems are built on a secure foundation. Security analytics that incorporate data from access control systems are a crucial tool in the…

Okta Turns 10: By the Numbers Edition

Last week, we celebrated Okta’s 10 Year Anniversary all around the world. We toasted to what we’ve accomplished as a team, reflected on some of our favorite memories, and looked forward to what’s next. Here’s a look at the last ten years, and here’s to the next ten!

4 Tools to Keep in your Risk-Assessment Toolbox

As more companies move to support cloud-based environments to work with better mobility and flexibility, their number of vulnerability points also increase. A thriving underground economy that trades in hacking tools, cyber crime services, stolen data, and credentials is estimated to be worth $600 billion annually—that’s more than the film, gaming…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube