digital identity

In the real world, it’s easy to prove someone’s identity, but tracking that profile digitally is much more complicated. From storing usernames and passwords to providing access controls, defining and protecting a user’s digital identity is the cornerstone of Okta’s security offering.

Introducing “Mistaken Identity,” Okta’s new podcast

What’s top of mind for today’s most successful product leaders? Creating a great customer experience, of course. But also, meeting business objectives. And staying ahead of the competition. And keeping user data secure. And complying with ever-changing regulatory requirements. And — well, the list goes on and on. With so many priorities to juggle,…

5 Important Insights From Our 2022 State of Zero Trust Report

What a difference four years makes.  Since launching our first State of Zero Trust report in 2019, we’ve been saying that the framework represents the future of security. This year, Zero Trust adoption reached a tipping point.  In 2019, many organizations that we surveyed acknowledged that Zero Trust was important, but just 16% had invested in…

How Okta Premier Partner SIA Became Okta’s Largest Pipeline Generator in Iberia in Just Two Years

In 2019, Iberian cybersecurity specialist SIA had no involvement with Okta. Fast forward two years and SIA is not only Okta’s only Premier Partner in Iberia, it’s also our largest pipeline generator in the region.  During this time, SIA also acquired the German cybersecurity firm MSS and has been increasingly targeting the customer base of its…

Never Heard of Identity Management Day? Here’s Why it Matters in 2021

Every year, vendors, solution providers, and practitioners are asked to absorb and utilize new technology, requirements, regulations—and new problem statements. And while this constant change attracts many of us, it can be daunting to find a consistent thread that pulls it all together. At Okta, we believe one of those threads is an identity…

5 Reasons You Want an Out-of-the-Box Identity Service

Whether you’re building a new app or migrating a legacy app to the cloud, you face a choice: build everything in-house or selectively use out-of-the-box services to make the job easier and faster. Out-of-the-box services like Twilio, for messaging, and Braintree, for payments, have gained popularity because they help lean dev teams remain agile…

4 Tools to Keep in your Risk-Assessment Toolbox

As more companies move to support cloud-based environments to work with better mobility and flexibility, their number of vulnerability points also increase. A thriving underground economy that trades in hacking tools, cyber crime services, stolen data, and credentials is estimated to be worth $600 billion annually—that’s more than the film, gaming…

Archive