What Are Microservices?

Microservices architecture, also known simply as “microservices,” is an approach to building software with modular services that are distinct and independent from each other.  In recent years, microservices have become a popular choice for designing and deploying applications. They allow apps to be broken into smaller and loosely coupled pieces …

The customer focused pains multiplied by where identity lives

Customers are the number one priority of any business who want to stay in business. Every customer has a digital identity – usernames, passwords and personal information - to interact with your business. These identities are stored in directories. Imagine each directory is like an individual world because that’s how they can appear and behave. The…

The workforce focused pains multiplied by where identity lives

Anyone who has ever experienced back problems will know that the greatest pain often manifests itself far from where the source of the problem lies, in the spine. The same is true in business, where directories are the backbone of every organisation, but the pain they can ultimately cause manifests itself in every business area from revenue to…

Gartner Recognises Okta as an Identity Leader — 7 Years in a Row

Last week, Okta was named as a Leader in Gartner’s fourth edition of its Magic Quadrant for Access Management report. We are the only vendor that has consistently been a Leader since the inception of Gartner’s evaluation of the identity space — starting with the first Identity as a Service (IDaaS) Magic Quadrant seven years ago.  Over the years,…

What Is SMS Authentication and Is It Secure?

SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…

What is Zero Trust Security?

Zero Trust is a security framework based on the belief that every user, device, and IP address accessing a resource is a threat until proven otherwise. Under the concept of “never trust, always verify,” it requires that security teams implement strict access controls and verify anything that tries to connect to an enterprise’s network. Coined in…

What Is Identity Governance and Administration?

Identity governance and administration (IGA) is a policy-based approach to identity management and access control. As the name implies, IGA systems merge identity governance and identity administration to provide additional functionality beyond traditional identity and access management (IAM) tools. Particularly, they offer valuable support in…

Archive

Follow Us
Share on Linkedin Share on Youtube