Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Why It’s Time to Break Up with Active Directory

Read More

Onward and Upward: Okta Named a Leader in Gartner’s Magic Quadrant for Access Management 2019

Read More

Best-of-Breed vs. Suites: Growth of Slack and Zoom Across the Okta Integration Network

Read More

The Production Line: The LDAP Interface

Read More
#LifeAtOkta

Compliance

Privacy

Research

Management

Technology
Partners
Company + Product
Customers + Partners
Industry Insight

InfoSec

Your Official Guide to DEF CON Threats

As the head of security for DEF CON, I’ve seen a lot of articles (and a bit of scaremongering) around the threats at the event. While DEF CON is a technically hostile environment, I promise, it is not a dystopian wasteland. A little common sense goes a LONG way....

How Secure is Social Login?

Social login gives application users the ability to apply existing login information from their social media accounts to register and sign into third-party sites. But before we jump into the topic of whether social login is secure or not, let’s answer the question below.

Do users really want...

Replace RSA SecurID with Modern MFA

Defense in depth, the coordinated use of multiple security layers to protect system and data integrity, is a multi-layered strategic approach which is deployed to minimize the risk of compromise. The basic premise is that if one security countermeasure is defeated, there is another to ensure your systems remain secure....