Okta Named A Leader In Forrester’s 2021 Identity as a Service for Enterprise Wave™

There were several reasons I chose to join Okta five months ago. Back in 2010, I witnessed Okta’s founders Todd McKinnon and Frederic Kerrest gamble on a forward-thinking idea for cloud identity. Since then, Identity-as-a-Service has become a massive category that includes customer identity, workforce identity, and machine identity. Identity today…

Four Benefits of Okta’s New Custom Admin Roles

Organisations across every industry are facilitating an exponential rise in new app creation and usage. This increase is making centralised access management increasingly costly and complex. Okta has always featured specific admin roles to meet these needs, spanning from “mobile admin” and “report admin” roles, to the global “Okta super admin”…

What Is Multi-Factor Authentication (MFA)?

MFA stands for multi-factor authentication, an identity verification method. MFA adds an extra layer of security on top of credentials like usernames and passwords. By doing so, it provides greater certainty that a user is who they claim to be before granting them access to an application, online account, or corporate network. MFA is a critical…

What Is Two-Factor Authentication (2FA)? 

Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network. Think of your most recent login…

Top Organisations Are Automating Identity With Okta Workflows

More than ever, IT teams need automation to effectively manage their increasingly complex identity tasks—especially as their networks of end-users grow. And without the time or money to build these capabilities in-house, many are turning to modern, low-  to no-code solutions. Check out the infographic below to learn how three Okta customers have…

What are Salted Passwords and Password Hashing?

Security is often not top of mind when creating customer-facing applications. But in a landscape of continual data breaches of major corporations like T-Mobile and Google, companies must be vigilant to adhere to security best practices. Processes like password salting and hashing are fundamental to the security posture of your apps. Understanding…

It’s Official: Okta Joins Forces With Auth0

At Okta, we’ve spent the past 12+ years focused on transforming cloud-based identity and empowering everyone to safely use any technology. Today marks a significant milestone for our team and acceleration of our journey: Okta and Auth0 are now one team. We’ve successfully completed the acquisition. I’ve long admired the impressive platform and…

What Is Identity and Access Management (IAM)?

Identity and access management (IAM) is a framework that enables organisations to ensure only the right people and devices have access to the right applications, resources, and systems at the right time. IAM encompasses the various policies, services, and technologies that allow organisations to verify every user’s identity and level of access at…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube