What Is Two-Factor Authentication (2FA)? 

Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network. Think of your most recent login…

5 Key Takeaways from Our 2021 State of Zero Trust Security Report

How important is it to implement Zero Trust? We asked over 600 business and security leaders across North America, Asia Pacific (APAC), Europe, the Middle East, and Africa (EMEA)—and the overwhelming consensus is that it has become crucial. With the unprecedented shift to remote work, the adoption of new digital products and services, and the…

Trust, Identity and... Elon, is That Really You? A Look Back at Forum21 Europe

When Elon Musk made a guest appearance at Forum21 Europe, many of us were more than a little surprised – but all was not as it seemed. ‘Elon’ was revealed to be Okta’s very own Ian Lowe, in a live demonstration of the deep connection between identity and trust, and why you should never take anything – or anyone – at face value. It was just one of…

What Is an Identity Platform?

An identity platform is a modern solution for managing the identities of users and devices in a centralized fashion. It enables organizations to securely authorize workforce and customer users to access their ecosystem using access management tools, programmable components, integrations, and platform services. Today’s organizations have a wide…

We See Decentralized Identity in Our Future

Identity and access management is always changing. And as our personal and professional lives become increasingly connected, the risk of data breaches and privacy infringement is always growing. It’s why many regulators, organizations, and individuals are turning their attention to decentralized identity, an approach that gives people more control…

User Management: An Afterthought for Some, Prerequisite for Others

You’ve just adopted a new service! Great! But no one is using it. Why not? It appears that no one has access to the application, so no one wants to create a new account with a new set of credentials. Even worse, the team who created the system failed to port over all the users. Would you want to use such a system? This scenario may sound odd, but…

A New Direction for Identity: Where Okta and Auth0 Come Together

The first time Okta CEO Todd McKinnon approached me about a merger in 2013, Auth0 was only five months old. I couldn’t believe it. With only two paying customers and a team not much bigger, Auth0 was just getting started. Okta, by contrast, was already a power player in the identity space. Its CEO’s interest in our tiny operation affirmed our…

Your Business Growth Depends on Customer Identity

A new era of business requires new methods for increasing revenue and accelerating business growth. The best way to do this? Leveraging modern technologies and tools. Providing customers with extraordinary digital experiences is more important than ever—and customer identity and access management (CIAM) is an essential component of this.  Today,…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube