Evolving Okta’s edge infrastructure

Okta is constantly evolving our cloud infrastructure to meet the needs of our customers. We place reliability and scalability at the core of our design decisions for services that process billions of authentications per month. This article dives into how a recent project to remove one of our most heavily trafficked services yielded significant…

Tools for strengthening your Identity posture before authentication

Security leaders today need to adopt a comprehensive approach to Identity-powered cybersecurity that extends beyond multi-factor authentication (MFA) and single sign-on (SSO) to mitigate threats before, during, and after authentication-based attacks. This approach begins pre-authentication with a strong Identity posture capable of discovering…

Leveraging Identity to detect and respond to potential attacks faster

When a potential breach becomes a concrete threat, the speed and efficacy of your response matter. According to IBM, the average cost of a data breach in 2023 was 4.45 million –– a 15% increase over the previous three years. Identity is central to preventing these costly outcomes, and it can play a powerful role in detecting and mitigating attacks…

How Thoughtworks solves the big (and small) problems with Okta Workflows

Thoughtworks is a global software consultancy firm with a reputation for tackling tough projects. As Steve Quirke, Identity team lead, explains: “We’re here to build the products that differentiate our customers from the competition. Clients hire us for our ability to digitally transform global enterprises at scale by applying strategic consulting…

How strong governance can reduce your SaaS spend

Identity governance has traditionally been considered a compliance-first toolset. For businesses looking to adopt an IGA solution, this has meant audit trails, thorough reporting, and access controls. But more recently, IGA’s security-driven role has grown. Savvy CISOs and CIOs recognize how the right solution can help safeguard an organization…

Leveraging Identity to enforce secure-by-design access policies

To provide their organizations with the strongest possible defense against the rising tide of sophisticated threats, security leaders need to adopt an approach to Identity-powered security that mitigates threats before, during, and after authentication-based attacks. Central to this approach is authentication itself –– specifically, the robust…

Okta Workflows joins the Okta Developer Forum

For years, Okta Workflows has had a thriving community of customers who have built flows and connectors for their orgs, solving simple and complex IT and security use cases at scale. We often see customers facing the same challenges and eagerly building their own solutions, workflows, and connectors, which spurs new innovation. The Workflows…

Archive

Follow Us
Share on Linkedin Share on Youtube