Okta

Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

What is Continuous Authentication?

Read More

Deconstructing the DOJ Iranian Hacking Indictment

Read More

Compliance

Privacy

Research

Management

Using hack_url_re to Auto Detect Website Spoofing Vulnerabilities

Phishing attacks often spoof websites in order to steal passwords, tricking users into entering credentials to a website that looks identical to the one they routinetly access. To avoid such trickery, account holders can trust their passwords to password managers like Okta’s SWA plugin, which are not fooled by visual...

Fintech — Securely Disrupting How we Bank

Financial technology (fintech) is one of the hottest categories of tech, and a major disruptor in banking and financial services. Billion-dollar valuation companies such as Stripe, Sofi and Square are competing with traditional financial institutions, and winning. And while these old-world companies have been taken by surprise, they are adapting...

The Evolution of Zero Trust: Next Gen Access

The Zero Trust security framework was first developed by John Kindervag in 2009 while he was at Forrester Research . Zero Trust challenged the traditional security model of a firewall forming a perimeter between a trusted internal network and an untrusted external one. This security approach breaks down if...