Okta advances device context features for Zero Trust security

In an era of increasingly sophisticated cyberthreats, organizations must operate on the premise that no user or device should be trusted by default. Every login attempt must be rigorously validated, including the secure state of the device requesting access. One of the cornerstones of Zero Trust is understanding the context of devices and…

Secure device access: The missing key to your security strategy

Between work and home, how many devices are you using every day? The proliferation of portable devices has magnified the cybersecurity challenges facing organizations of all sizes.  For many businesses, the challenges of managing and securing IT assets have been amplified by “bring your own device” policies. As a result, IT organizations often no…

Extend your passwordless journey to device login

Okta Device Access now supports passwordless login and FIDO2 YubiKeys for Desktop MFA Despite all the talk of driving workers back into the office, most companies still offer remote and hybrid work arrangements. According to a report from McKinsey, 56% of employees work at least part-time away from the office and 7% work fully remotely. That means…

Okta Device Access: Identity-powered security starts at power up

For over a decade, Okta has led the way companies access data and apps in the cloud, allowing organizations to securely transform into modern digital businesses. As we continue to innovate to protect our customers from identity threats like the rise of phishing attacks, we need to ensure they can harness the same technology to secure access at any…

Universal Directory Enhancements are Scaling With You

The digital transformation of the last decade has come with many unexpected byproducts. A key one is the proliferation of user data stores, especially among cloud apps holding their own user-identity databases. A centralized identity management system is critical. Okta Universal Directory (UD) was built to control this sprawl of user attributes…