Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Okta’s New CSO on Preparing for the Future

We often talk about how the enterprise is changing and evolving—but the transformation we’ve seen in the past two months is unparalleled. In a matter of weeks, hundreds of millions of people around the world have had to make the shift to remote work and companies have had to...

What Is SOC Compliance?

SOC is a set of standards that allow companies to demonstrate they are managing and regulating information properly. SOC stands for “service and organization controls;” developed by the American Institute of Certified Public Accountants (AICPA), these regulations exist to give companies peace of mind when exchanging customer data with third-party...

What Is Spear Phishing?

Spear phishing is a form of cyber attack targeted at a particular person or small set of individuals. In these scams, bad actors research their chosen targets and attempt to convince them to surrender sensitive data or financial information. Spear phishing attacks may also aim to infect user devices...

Okta One-Minute Case Study: Emerson

"How did you do it so fast?" According to Matt Freeman, senior manager of identity management at Emerson, this was the most common question he received from Emerson leadership once they’d completed their largest transition to a Hybrid IT environment. In a move toward modernization, this Fortune...

What Is Data Theft?

Data theft is the act of stealing information stored on corporate databases, devices, and servers. This form of corporate theft is a significant risk for businesses of all sizes and can originate both inside and outside an organization.

The term data theft can give the...