Cloud-First Agility to Securely Remote Enable Your Workforce

In my previous blog, I introduced the concept of why hybrid, cloud-first, identity solutions are fundamentally different from those with an on-premises-first focus, providing you with a huge competitive advantage. Over the next few blog posts, I’ll be digging deeper into these differences, and detailing the advantages you’ll get by adopting Okta’s…

Founders in Focus: DataGrail

Welcome to our Founders in Focus series, where each month we highlight one of the founders of Okta Ventures’ portfolio companies. You’ll learn more about them and how they work with Okta. This month, we’re getting to know DataGrail, and their mission around privacy compliance. What is DataGrail and what is your mission? DataGrail aims to make…

GitLab Goes All In on Zero Trust to Secure a Fully Remote Workforce

Only a few companies can claim they’re working on solutions so cutting edge that they’re still uncovering new ways their product is useful. GitLab, a complete DevOps platform and lifecycle tool, is one of these companies. What differentiates GitLab is its guiding philosophy: the company specializes in web-based, open-source code and DevOps…

What Is Data Misuse?

Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements. Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when…

Securing Remote Work Any Time, Anywhere, at Scale

Today, we’re excited to announce how Okta is working with CrowdStrike, Netskope, and Proofpoint to help organizations implement a modern, comprehensive, and integrated security strategy needed to protect today’s dynamic and remote working environments at scale. The COVID-19 pandemic has ignited a sudden shift to remote work, driving an…

Spring Cleaning for the Enterprise: Reduce Complexity, Cost, and Vendors

As they strive to meet the demands of today’s technical landscape, there’s a new challenge arising for the world’s largest organizations. These external demands can be summed up in 3 pressing imperatives that all enterprises must embrace: Deliver on modernize IT initiatives Create secure and seamless customer experiences Adopt a zero-trust…

What is a One-Time Password (OTP)?

A one-time password or passcode (OTP) is a string of characters or numbers that authenticates a user for a single login attempt or transaction. An algorithm generates a unique value for each one-time password by factoring in contextual information, like time-based data or previous login events. Tech support teams typically administer OTPs to…

What Is a Data Breach?

A data breach happens when cybercriminals gain unauthorized access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…

Archive

Follow Us
Share on Linkedin Share on Youtube