Celebrating the Power of You: Announcing Our Oktane Awards Finalists

Our favorite part of Oktane is seeing our Okta ecosystem come to life-- our partners, team, and most importantly, our customers. With this year’s theme being “All You,” we look forward to hearing about the unique ways that you are using Okta and the cloud to transform your organization. Whether it’s automating lifecycle management or securing end…

Behind Okta.com: A Day in the Life of Jamie Lee Rice

From discovering this blog post to downloading product resources, every step of your journey through okta.com has been thoughtfully curated thanks to Jamie Lee Rice, Okta’s Director of Web Marketing. Jamie Lee and her team genuinely care about creating web experiences that showcase each team’s unique work and help visitors get to exactly what they…

How Okta Integrates Into Active Directory (and 5 Benefits for IT)

Microsoft’s Active Directory (AD) is critical in a distributed network for identity management to providing a single source of truth. However, it comes with heavy drawbacks, particularly the hidden and ever-increasing costs in time. After initial installation and configuration for AD, every application needs to be connected and maintained, users…

Using Okta Adaptive MFA for PCI 3.2

PCI DSS, or the Payment Credit Industry Data Security Standard, is an industry regulation that applies to any company that accepts credit cards for payments processing. The goal of the standard is to establish best practices in securing consumer information to prevent broad scale breaches of credit card and personal information. As identity is…

It’s ALL YOU at Oktane17

Our fifth annual customer conference Oktane17 is just a month away and I’m looking forward to seeing you all there. Oktane has always provided an opportunity for you — our customers — to learn from each other, get hands-on training, and discuss how you’re solving your most critical challenges. And this year’s theme, “all you,” focuses on how you…

Okta’s Vision for Access Management

The future of Identity and Access Management is changing. Where Access Management (AM) was once one of many components of the legacy IT stack, it is shifting to the central role in how companies will modernize and manage IT – using identity to drive transformational change across all aspects of their business. AM has already started to evolve in…

Industry Report: A New Mandate for IAM with Multi-Factor Authentication

Regardless of exactly how data breaches occur, the culprit is almost always weak or stolen passwords. According to the Verizon 2017 Data Breach Investigations Report, they account for 81% of all breaches. The result of this, according to a new IDG survey sponsored by Okta, is that 74% of IT and security leaders have flagged identity and access…

Archive

Follow Us
Share on Linkedin Share on Youtube