6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

Byte-Sized Video: Don’t Limit the Scope of Your SSO and MFA

No matter how much you may love your users, you can’t trust all of them. With so many individuals and devices accessing your apps, and requests coming from various networks, there’s a real risk of bad actors slipping through the cracks. Single-sign on (SSO) and multi-factor authentication (MFA) are must-haves when it comes to modern security. To…

What is Hybrid IT?

Hybrid IT is a deployment model that combines solutions of different kinds to form the overall IT infrastructure. Most of the time, hybrid IT combines solutions hosted on-premises with cloud services. Hybrid IT is considered the most popular deployment model (especially in larger organizations). Almost 70% of large enterprises use this type of…

How to Navigate Ever-Changing Identity Data

As we discussed in our first post, 4 Ways to Elevate Your Identity Game with Lifecycle Management, one of your first hurdles during an identity initiative often surrounds the management of your identity data. This challenge can be mitigated by moving towards a single source of truth for, not just your employees, but also contractors, partners, and…

How Security Leaders from Okta, Proofpoint, Netskope, and Crowdstrike are Embracing the Work-From-Home Opportunity

This spring and summer, companies across many verticals have had no choice but to buckle up and shift into full support for remote work, and retooling as quickly as possible to secure anytime, anywhere, any-device access for their teams Companies are calling on their Chief Security Officers to lead this incredibly rapid shift into the cloud future…

In the Age of Remote Work, Securing Office 365 Is a Must

According to our Businesses @ Work Reports, Microsoft’s Office 365 has ranked as the #1 most popular application within the Okta integration network for the last few years — both by number of customers and by number of monthly active users.   Top apps by number of customers - Businesses @ Work 2020 Top apps by number of monthly unique active…

Securing Data Across APAC: Achieving APEC PRP Certification

At Okta, trust and transparency are core to who we are as a company. These values critically inform the way we view our responsibilities to our customers and to the personal data of their users that they entrust to Okta. The keystone of our transparency is providing our customers with a clear understanding of how we collect, process, and secure…

MFA to On-prem Apps Fast and Easy with Okta Access Gateway

At Okta, we love to secure access to everything from a single platform. This, of course, includes on-premises apps. As spoiled here, our specialists wanted to weigh in on how Okta Access Gateway (OAG) is at its best when paired with the features that make up the Okta platform. In other words, we’re giving you the Secret Sauce! This month, Regional…

Archive

Follow Us
Share on Linkedin Share on Youtube