Using Okta Adaptive MFA for PCI 3.2

PCI DSS, or the Payment Credit Industry Data Security Standard, is an industry regulation that applies to any company that accepts credit cards for payments processing. The goal of the standard is to establish best practices in securing consumer information to prevent broad scale breaches of credit card and personal information. As identity is a…

What's Next in the Evolution of Password Management?

Since the early days of computing, users have inputted passwords to prove their identities. Today, as computers have progressed to something in everyone's pocket, password management is changing. No longer is having memorized an over-long string of numbers and letters the hallmark of a sophisticated user. Instead, authentication at the cutting…

Decoding Customer IAM (CIAM) vs. IAM

The world of Identity and Access Management (IAM) is rarely controversial. But today, there is a battle brewing in how we - as an industry - talk about customer-facing use cases for IAM. Many are starting to refer to this as Customer IAM or Consumer IAM, both abbreviated as CIAM. CIAM does have some unique requirements. But that does not mean that…

The Importance of SSO in Enterprise IAM

In today’s identity management climate, single sign-on (SSO) capability is critical to the success of enterprise identity and access management (IAM). IT departments face growing demands: managing thousands of users, both internal and external, who each need access to an increasing number of cloud-based applications. Adding to this complexity is…

3 Important Security Trends Affecting Cloud Identity

The fast-changing world of cybersecurity can be complex, with plenty of news to sort through to find out what will affect IT systems in the months—and years—to come. In terms of cloud identity, zooming out to see the big picture reveals three particular trends that are poised to make a huge impact on security: the Internet of Things (IoT), Big…

What is SCIM?

SCIM, or System for Cross-domain Identity Management, is an open standard that allows for the automation of user provisioning. It was created in 2011 as it became clear that the technology of the future would be cloud-based. SCIM communicates user identity data between identity providers (such as companies with multiple individual users) and…

Reflecting on 2016

In 2016, we heard resoundingly from you — our customers — that you’re responsible for leading disruptive change within your businesses. You’re unifying your organisations, building closer relationships with your customers and partners, dreaming up brand new products and rethinking your businesses models with technology. Your missions and work are…

Archive

Follow Us
Share on Linkedin Share on Youtube