What Is Two-Factor Authentication (2FA)? 

Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network. Think of your most recent login…

The ACSC Essential Eight: Delivering MFA for all Australians

Australian government agencies will soon be expected to apply multi-factor authentication (MFA) to the digital services they provide to the Australian public, as part of a substantive overhaul to the ACSC’s Essential Eight Maturity Model. The Essential Eight is a set of priority controls agencies are expected to implement to mitigate cyber…

Why 3 Companies Moved Away from Active Directory

With ever-growing networks of employees, contractors, and partners working remotely across devices, organisations are trading Microsoft Active Directory (AD) for Okta Universal Directory (UD). Why? Because UD can easily keep up with companies’ evolving directory and access management needs. Impossible? Read this infographic to see how AD was…

User Management: An Afterthought for Some, Prerequisite for Others

You’ve just adopted a new service! Great! But no one is using it. Why not? It appears that no one has access to the application, so no one wants to create a new account with a new set of credentials. Even worse, the team who created the system failed to port over all the users. Would you want to use such a system? This scenario may sound odd, but…

Top Organisations Are Automating Identity With Okta Workflows

More than ever, IT teams need automation to effectively manage their increasingly complex identity tasks—especially as their networks of end-users grow. And without the time or money to build these capabilities in-house, many are turning to modern, low-  to no-code solutions. Check out the infographic below to learn how three Okta customers have…

What are Salted Passwords and Password Hashing?

Security is often not top of mind when creating customer-facing applications. But in a landscape of continual data breaches of major corporations like T-Mobile and Google, companies must be vigilant to adhere to security best practices. Processes like password salting and hashing are fundamental to the security posture of your apps. Understanding…

It’s Official: Okta Joins Forces With Auth0

At Okta, we’ve spent the past 12+ years focused on transforming cloud-based identity and empowering everyone to safely use any technology. Today marks a significant milestone for our team and acceleration of our journey: Okta and Auth0 are now one team. We’ve successfully completed the acquisition. I’ve long admired the impressive platform and…

What Is Identity and Access Management (IAM)?

Identity and access management (IAM) is a framework that enables organisations to ensure only the right people and devices have access to the right applications, resources, and systems at the right time. IAM encompasses the various policies, services, and technologies that allow organisations to verify every user’s identity and level of access at…

Okta’s Redesigned End User Dashboard - Now 50% Faster!

You’ll often hear our CEO and co-founder, Todd McKinnon, talk about how our mission at Okta is to connect users to their technologies. An important part of how we do this is through the Okta End User Dashboard, a modern web portal that makes it simple and secure for end users to quickly get access to their applications.  With a single click, users…

CCPA vs. GDPR: Similarities and Differences Explained

The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are laws that emerged to give individuals greater power over their personal information. Both regulate organisations that collect and use data in a variety of ways. A brief summary of the CCPA: Gives California residents increased transparency and control…

Archive

Follow Us
Share on Linkedin Share on Youtube