Supporting the UK’s Ambitious Government Transformation Strategy

All over the world, governments are developing ambitious digital transformation strategies to provide better public services more efficiently and cost effectively. The UK government is no exception. In fact, it’s Government Transformation Strategy is one of the most far-reaching projects of its kind, aiming to use a £450m budget to save £3.5bn by…

How to Use Progressive Profiling as a Privacy Tool

User experience is top of mind for developers building customer-facing applications—and an important element of that is collecting user information. When developers avoid lengthy forms and overwhelming data capture as part of the onboarding process, users have a more seamless experience, right from the outset of using a new application. This…

Five Strategies to Simplify User Onboarding

Scaling organizations have a problem. While an influx of new employees is always reason to celebrate, it also comes with added management overhead as all the new users are onboarded onto the company’s applications and systems. As every ambitious company knows, IT’s time is best spent contributing to projects that will shape the future of their…

How 10 Years of Customer Feedback Has Influenced Okta's Products

For any business that began life as a humble startup, each year is a big deal—but when you hit your 10 year anniversary, it’s pretty surreal. We’ve learned a lot in 10 years; much of it thanks to our customers who have been our intrepid companions on this journey. To me, one of the most important changes we’ve made is how we understand our…

How to Use Feedback Loops to Find the Gaps in your Security Strategy

Organizations are under ever-greater pressure to leverage new app technologies to drive competitive advantage and growth. Yet these ambitious plans all come crashing down if they can’t guarantee that modern IT systems are built on a secure foundation. Security analytics that incorporate data from access control systems are a crucial tool in the…

Okta Turns 10: By the Numbers Edition

Last week, we celebrated Okta’s 10 Year Anniversary all around the world. We toasted to what we’ve accomplished as a team, reflected on some of our favorite memories, and looked forward to what’s next. Here’s a look at the last ten years, and here’s to the next ten!

4 Tools to Keep in your Risk-Assessment Toolbox

As more companies move to support cloud-based environments to work with better mobility and flexibility, their number of vulnerability points also increase. A thriving underground economy that trades in hacking tools, cyber crime services, stolen data, and credentials is estimated to be worth $600 billion annually—that’s more than the film, gaming…

Taking Care of Business: Debuting Our Fifth Annual Businesses @ Work Report

Today, while celebrating Okta’s 10th anniversary, we’re proud to launch our fifth Businesses @ Work report. A lot has changed over the past years. In our first report, we mused that companies were finally finding their footing with apps and multi-factor authentication. At the time, we were proud to reveal that companies were adopting an average of…

5 Mistakes That Can Drive Up User Migration Costs

If you’re upgrading to new company software, a new operating system, or even moving from on-premises systems to the cloud, you’re thinking about user migration. User migration projects are rarely quick, nor easy, as they demand meticulous planning and attention to detail. However, with proper foresight and preparation, user migrations don’t need…

Archive

Follow Us
Share on Linkedin Share on Youtube