How Okta Integrates Into Active Directory (and 5 Benefits for IT)

Microsoft’s Active Directory (AD) is critical in a distributed network for identity management to providing a single source of truth. However, it comes with heavy drawbacks, particularly the hidden and ever-increasing costs in time. After initial installation and configuration for AD, every application needs to be connected and maintained, users…

Using Okta Adaptive MFA for PCI 3.2

PCI DSS, or the Payment Credit Industry Data Security Standard, is an industry regulation that applies to any company that accepts credit cards for payments processing. The goal of the standard is to establish best practices in securing consumer information to prevent broad scale breaches of credit card and personal information. As identity is…

It’s ALL YOU at Oktane17

Our fifth annual customer conference Oktane17 is just a month away and I’m looking forward to seeing you all there. Oktane has always provided an opportunity for you — our customers — to learn from each other, get hands-on training, and discuss how you’re solving your most critical challenges. And this year’s theme, “all you,” focuses on how you…

Okta’s Vision for Access Management

The future of Identity and Access Management is changing. Where Access Management (AM) was once one of many components of the legacy IT stack, it is shifting to the central role in how companies will modernize and manage IT – using identity to drive transformational change across all aspects of their business. AM has already started to evolve in…

Industry Report: A New Mandate for IAM with Multi-Factor Authentication

Regardless of exactly how data breaches occur, the culprit is almost always weak or stolen passwords. According to the Verizon 2017 Data Breach Investigations Report, they account for 81% of all breaches. The result of this, according to a new IDG survey sponsored by Okta, is that 74% of IT and security leaders have flagged identity and access…

What's Next in the Evolution of Password Management?

Since the early days of computing, users have inputted passwords to prove their identities. Today, as computers have progressed to something in everyone's pocket, password management is changing. No longer is having memorized an over-long string of numbers and letters the hallmark of a sophisticated user. Instead, authentication at the cutting…

Decoding Customer IAM (CIAM) vs. IAM

The world of Identity and Access Management (IAM) is rarely controversial. But today, there is a battle brewing in how we - as an industry - talk about customer-facing use cases for IAM. Many are starting to refer to this as Customer IAM or Consumer IAM, both abbreviated as CIAM. CIAM does have some unique requirements. But that does not mean that…

Archive

Follow Us
Share on Linkedin Share on Youtube