Passwordless Authentication: Where to start

Let’s face it: we’re all tired of passwords. They’re a major pain for users and not nearly as effective at securing accounts as they pretend to be. Thankfully, there is a better way! We are excited to announce a new set of passwordless capabilities in Okta that will allow you to deliver seamless auth experiences to all users! In this post, we’ll…

How Our Core Values Shape Our Identity

Some business’ core values have become very well-known, or even iconic—remember Google’s original code of conduct, “Don’t Be Evil”? It’s pithy and impactful, yet also vague and conceptual. This statement has since been altered to a more democratic, “You can make money without doing evil.” After all, there’s something to be said for having guiding…

3 Data Breach Myths Debunked

As the ever-shifting security and threat landscape continues to evolve, it can be tough to distinguish security fact from fiction. Some common data breach misconceptions can seriously misinform your organization’s security strategy. In this post, we’ll touch on three of the most common data breach myths, and share some information on why they don…

CTOs Should Embrace, Stick to a No-Meeting Day

You know the feeling: You open your calendar in the morning to find a completely booked day, back-to-back meetings and not even 15 minutes of time to complete any of the items on your to-do list. In fact, your day tomorrow and the day after look just as booked. An HBR study conducted last year found that face-to-face requests are 34 times more…

Okta + VMware Use Cases

Following the announcement of our extended integrations with VMware last week, we thought you might enjoy learning about some of the common projects we see joint Okta and VMware customers undertake, and how the existing integration and these recent improvements can help unlock more value for our customers. Okta and VMware work together to help…

What is Passwordless Authentication?

Passwordless authentication is an emerging authentication method that has been gaining traction as of late. In this post, we’ll explore what passwordless authentication is, the usability and security challenges that passwords present, and the benefits of passwordless authentication. What is passwordless authentication? At a basic level,…

A Summer in Tech: A Day in the Life with our 2019 Okterns

As we continue to bask in the warm sunshine, it’s only a matter of time before the summer officially comes to an end. We wanted to wrap up the season by highlighting our amazing group of summer Okterns (Okta interns) before they head back to school. Here’s how the Summer Oktern Class of 2019 launched their careers with Okta: How did you find out…

Better together: Using the Okta integration with HashiCorp Terraform

UPDATE: It's official, Okta's Terraform provider has been certified by HashiCorp! To get started, check out the official docs here. Want to contribute or open an issue? Find the project here. Organizations using Okta as their Identity layer can easily integrate Okta into their continuous integration (CI), continuous delivery (CD), and development…

Here’s How You Solve the Lifecycle Management Problem

Every time you hire a new employee, a number of things must happen across HR and IT teams to get them access to the systems and tools they need to do their job. At the core of these onboarding processes is your company’s identity management (IDM) system, which monitors your employees’ lifecycles from beginning to end—every hire, role change,…

Archive

Follow Us
Share on Linkedin Share on Youtube