Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

What is Continuous Authentication?

Read More

Deconstructing the DOJ Iranian Hacking Indictment

Read More

Compliance

Privacy

Research

Management

9 Admin Best Practices to Keep your Org Secure

When implementing security policies across an organization, most administrators want to adhere to industry best practices. But that’s not as easy as it may seem: the threat landscape isn’t static — it’s changing day by day.

What were once considered the best practices for security configurations, including password policies...

SecurityInsights: Protection at the Admin, User, and Network levels

Modern organizations are adopting new technologies more rapidly than ever before, and their increasingly mobile workforces — which include not only employees, but external contractors and partners — have expanded far beyond office walls.

Today’s organizations face progressively complex security challenges, and must maintain a posture that offers robust...

How to Protect IL4 Data with Okta

The Federal Risk and Authorization Management Program is an assessment and authorization process that US government agencies use to ensure their cloud-based applications are appropriately secure. Under FedRAMP Moderate or FedRAMP+, cloud service providers (CSPs) must meet an extensive set of controls—up to 363—to be granted an Authority to Operate...

Passwordless Authentication: Where to start

Let’s face it: we’re all tired of passwords. They’re a major pain for users and not nearly as effective at securing accounts as they pretend to be. Thankfully, there is a better way! We are excited to announce a new set of passwordless capabilities in Okta that will allow...

What is Passwordless Authentication?

Passwordless authentication is an emerging authentication method that has been gaining traction as of late. In this post, we’ll explore what passwordless authentication is, the usability and security challenges that passwords present, and the benefits of passwordless authentication.

What is passwordless authentication?

At a...