Okta’s Redesigned End User Dashboard - Now 50% Faster!

You’ll often hear our CEO and co-founder, Todd McKinnon, talk about how our mission at Okta is to connect users to their technologies. An important part of how we do this is through the Okta End User Dashboard, a modern web portal that makes it simple and secure for end users to quickly get access to their applications.  With a single click, users…

CCPA vs. GDPR: Similarities and Differences Explained

The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are laws that emerged to give individuals greater power over their personal information. Both regulate organisations that collect and use data in a variety of ways. A brief summary of the CCPA: Gives California residents increased transparency and control…

Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?

Being authentic is a high term of praise—if we think people are authentic, we believe them to be trustworthy, loyal, and dependable. There's a similar concept in computer security. Business networks are crucial to protect, so firms want only authorized people accessing them. In cybersecurity, authentication means verifying that a person or device…

Okta Privileged Access: Unlocking Zero Trust Security at the Infrastructure Level

Every company that operates production software has compliance requirements. The vast majority of those organisations also carry significant infrastructure in the cloud and/or on-premises. And they all require a safe way to provide access to their developer workforce. Traditionally, there were two ways to achieve this: building a DIY system to…

Okta Identity Governance: Modern, Cloud-Based IGA

Since the 2000s, companies have turned to Identity Governance and Administration (IGA) software to achieve automation and compliance outcomes. But the traditional IGA systems we’ve come to know have been costly, complex, and designed for on-premises applications and infrastructure. They simply don’t meet the needs of today’s dynamic, remote…

What is a Domain Name System (DNS)?

What Is the Domain Name System (DNS)?  The domain name system (DNS) makes it possible for browsers, apps, and servers to load internet resources. Think of it like a phonebook—except instead of associating a person’s name with a phone number, it maps a domain name (e.g., okta.com) to an internet protocol (IP) address that can be understood by…

What Is Personal Data?

Put simply, personal data is information that relates to 1. an identified or identifiable person or 2. an identified or identifiable legal entity (where such information is protected similarly as personal data under applicable data protection laws and regulations). While regulations use different terms with slightly varying definitions, “personal…

Security Questions: Best Practices, Examples, and Ideas

Security questions are a common method of identity authentication—one you’ve probably encountered before. When creating an account or signing up for a service online, users will confidentially share the answers to secret questions with a provider.  Typically, these security questions and answers are used for self-service password recovery…

Okta + Auth0: Powering Identity for the Internet

Okta’s vision is to safely enable everyone to use any technology. To achieve this ambitious mission, we’ve been investing heavily in customer identity — enabling organisations to build secure customer experiences — and transitioning from delivering products to building a true platform to address every identity use case. Today, we're taking a…

Archive

Follow Us
Share on Linkedin Share on Youtube