Company + Product

Company + Product

Spotlight on Preston King: A pillar of support, innovation, and leadership in the “What’s Next” program

In the face of a growing cybersecurity skills gap, Okta’s What’s Next program creates opportunities for individuals to upskill, reskill, and make a meaningful impact in the field of Identity and Access Management (IAM).  One of the program’s most exceptional participants is Preston King, a dedicated, highly technical, and collaborative individual…

Launch Week '24: Oktane edition

Launch Week is here again, and this time around we have a special Oktane edition. As usual, you’ll learn about our newest innovations, but you’ll also get a sneak peek into exciting developments that will be available in the coming year. Let’s dive in. Okta Workforce Identity Cloud Identity has become the organizational security linchpin, and…

Introducing Okta’s Secure Identity Assessment: Your path to reducing Identity debt

Identity has never been more important to securing the modern world. No two organizations are the same, and each faces unique security challenges. Addressing Identity debt has become critical to maintaining operational integrity. Organizations implementing a Zero Trust architecture enforce strict access controls and logging mechanisms, which can…

New enhancements to the Workforce Identity Cloud's unified security solution announced at Oktane 2024

Technology is unlocking opportunities and business outcomes like never before, but it’s also introducing complexity and potential risk for organizations.  When a biomedical engineering team spins up new AI models, they could drive business outcomes like accelerating a clinical trial for a new vaccine. At the same time, IT and security teams have…

Okta’s mission to standardize Identity Security

Identity is under attack. Over 80% of data breaches involve compromised Identity,* the main enterprise security entry point for workforce and consumer applications.  Lack of standardization is a major reason for this. Without a unifying industry standard for Identity Security that provides full visibility into every part of the technology stack,…

Okta advances device context features for Zero Trust security

In an era of increasingly sophisticated cyberthreats, organizations must operate on the premise that no user or device should be trusted by default. Every login attempt must be rigorously validated, including the secure state of the device requesting access. One of the cornerstones of Zero Trust is understanding the context of devices and…

Okta Identity Security Posture Management and Workflows: Automated detection and remediation of local accounts

In a previous blog about Okta Identity Security Posture Management, we discussed the challenges and potential solutions that enterprises face when dealing with local account management and security. Today, we’ll look into an example of a solution for security teams, regardless of the application that creates local users. What we’ll explain is…

Archive