Company + Product

Company + Product

Securing privileged Active Directory accounts with Okta

In today’s hybrid IT landscape, Active Directory (AD) remains a cornerstone for Identity management. However, privileged AD accounts present a significant security risk if not managed properly.  That’s why we’re pleased to announce that AD integration with Okta Privileged Access is now available in Early Access. With this feature, organizations…

Launch Week ‘25: Showcase edition

Innovation never stops, and neither do we. As cyberthreats evolve, Identity remains the first line of defense. That’s why, during this Launch Week, we’re unveiling the latest advancements in Identity Security — designed to streamline access management and deliver seamless, secure experiences.  Whether you’re securing your workforce, customers, or…

Stay secure with FastPass and Trusted App Filters

Phishing resistance first Phishing-resistant authentication is the current baseline for secure authentication, which means FIDO/WebAuthn, FastPass, PIV/CAC, etc. This post will focus on how those already meeting this baseline can take security to the next level. Passwords, SMS, push notifications, and one-time codes are vulnerable to much less…

Realms: A new, flexible way to manage your organization 

Okta’s vision for Universal Directory includes providing a centralized approach to Identity management that allows customers to integrate any technology stack into a comprehensive, central cloud directory for unified management. In today’s world, unified Identity management is increasingly challenging. Relying on a workforce composed of employees,…

5 tips to help secure OAuth and OpenID Connect tokens

Safeguarding personal and business information is more crucial than ever as digital technology becomes increasingly prevalent. Identity serves as the primary security boundary for enterprise and consumer applications. As cyberattacks and data breaches continue to rise, protecting sensitive data has become a key priority for individuals and…

Non-human and human identities: A unified approach

Organizations often treat human and non-human identities (NHIs) as separate security challenges. This siloed approach made sense in traditional data centers. However, the rapid adoption of cloud services and SaaS applications has fundamentally changed how identities interact and how to secure them. Managing human and machine identities separately…

Archive