What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

Our Commitment to Investing in our Black Colleagues and Communities

This afternoon, Todd sent the email below to all Okta employees, and wanted to share it with our customers and partners here. ++ Hi Everyone, In the wake of recent racial injustice and tragic violence, and the conversations they continue to spark throughout the company, Freddy and I want to thank you for your open feedback and clear desire for…

Doing the Work at Okta: Our Commitment to Driving Change

We’re all still recovering from the events of the last two weeks, and are taking in and supporting the voices of our POC colleagues throughout the company. Since joining Okta in 2019, my role has been to lead the Diversity, Inclusion, and Belonging (DIB) team at Okta. The last few weeks have shown us how important it is to focus on these ideals,…

How Okta and Proofpoint Defend the New Perimeter: People

The balance of power between codebreakers and those keeping information safe has shifted back and forth throughout history. But one oversight has remained constant: defenders focus on systems, while attackers focus on people. Businesses still aren’t allocating the right amount of their security budgets to protecting a critical target: their people…

Roadmap: We’re Enhancing Okta Admin and End-User Experiences

At Okta, our goal is to empower any organization and any person to access any technology. To do that, enterprise IT tools need to be simple and seamless to use, and should deliver intuitive user experiences while remaining highly secure. With that in mind, we’ve introduced several major updates that will significantly enhance your admin and end…

The Path to Continuous Authentication: Solving the Best of Breed Problem

For years the network perimeter has been the foundation for controlling access to digital resources: kill the network, and the user no longer has access. Today’s cloud-first world has changed that, shifting the security perimeter to users and devices—and as companies continue to adopt best of breed solutions that enable their workforce, they need…

Archive

Follow Us
Share on Linkedin Share on Youtube