How identity can unlock the future of hybrid work in Europe

In the two years since the pandemic transformed the way we work forever, the long-term impacts on businesses are only just materialising. In my session at our recent Oktane22 event, I explored the challenges of moving from continuity based remote working practices to a more resilient hybrid working model. Here are some key insights from my session…

3 ways identity helps retailers maintain privacy & compliance

Big data is a hot commodity in the modern retail world. By harnessing key insights on buying behaviours, geographical locations, product preferences, and more, organisations can deliver the streamlined and highly personalised shopping experiences that delight customers, increase differentiation, and drive sales in both the long-term and the short…

Okta Named a Leader in Gartner® Access Management Magic Quadrant™ for the Sixth Consecutive Year

I’m honoured to share that Okta was named a Leader by Gartner® in the 2022 Magic Quadrant™ for Access Management report for the sixth consecutive year, and positioned highest on the Ability to Execute axis. This is also the second year in a row Okta is placed highest on the Ability to Execute axis, which we believe demonstrates our strong focus…

5 Steps to Build a Business Case for Identity

In this blog, Max Faun explains the five steps to take when building a business case for Identity & Access Management (IAM). Successful adoption of any enterprise tech solution requires three things: time, effort, and investment. This is especially true when it comes to Identity & Access Management (IAM).  But before you can even consider…

How Can Identity Powered Zero Trust Support Data Privacy Compliance in the UK?

In a complex, post-Brexit regulatory environment, this blog explores how an Identity powered approach to Zero Trust can help UK organisations stay on top of data privacy compliance. When the General Data Protection Regulation (GDPR), first came into force across the E.U., it was widely heralded as the world’s strongest set of consumer privacy and…

How Can Identity Help Your Organisation Reach Its Cloud Adoption Goals?

The race to the cloud has been underway for over a decade, but in the past two years its pace has picked up. According to the Cloud Industry Forum’s latest research, as many as 94% of global companies now rely on cloud services for at least some portion of their IT infrastructure or mission-critical applications.  Decision-makers have long been…

Why You Can’t Have Zero Trust Security Without Identity

Surging cybercrime is a major concern for every organisation today. As employee expectations for more flexible working continue to grow, IT and Security leaders face immense pressures to protect their hybrid workforce as they move beyond the traditional network perimeter. Yet, with cyberattacks having risen by 50% in the last year alone, 61% of…

How to Accelerate IT Modernisation With Identity

Speed and agility are of the essence in today’s digital-first world. It’s why IT modernisation is a key priority for organisations in the race to enhance efficiency, improve cyber resilience and harness the power of the cloud. In the latest instalment of Okta and Computer Weekly’s Identity Made Easy podcast series, we explore the challenges IT…

Building customer trust in retail’s digital era

Your customers' expectations are evolving. According to a PwC report, nearly 80% of consumers today cite speed, convenience, knowledgeable help and friendly service as the most important elements  of a positive customer experience. And one in three (32%) say they would walk away from a brand they love if those needs aren’t met. But what factors…

Zero Trust in Europe: Special Considerations in an Evolving Regulatory Climate

In this blog we explore some of the special regulatory considerations organisations should understand when adopting a Zero Trust strategy in Europe. As enterprise technology ecosystems evolve to include a growing number of cloud resources, mobile and employee-owned devices, and digital business processes, the traditional approaches to securing…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube