Company + Product

Company + Product

Introducing Log Investigator: Transform your security operations with AI-powered log analysis

Detecting and responding to potential Identity security threats is no longer simply an advantage in modern cybersecurity but a necessity. At the same time, as organizations scale their digital operations, Identity security practitioners need access to a richer and more complex set of identity log data than before — one demanding constant attention…

3 ways Okta can help you improve your security posture and respect privacy-forward human rights

This is the second in our blog series on trust/security and human rights. You can find our first blog here. Identity is the connection between people and technology, and it’s the front door to all digital interactions. As the threats we face evolve, Identity has become increasingly important to our communities and workplaces. Cybercriminals are…

Spotlight on Preston King: A pillar of support, innovation, and leadership in the “What’s Next” program

In the face of a growing cybersecurity skills gap, Okta’s What’s Next program creates opportunities for individuals to upskill, reskill, and make a meaningful impact in the field of Identity and Access Management (IAM).  One of the program’s most exceptional participants is Preston King, a dedicated, highly technical, and collaborative individual…

Launch Week '24: Oktane edition

Launch Week is here again, and this time around we have a special Oktane edition. As usual, you’ll learn about our newest innovations, but you’ll also get a sneak peek into exciting developments that will be available in the coming year. Let’s dive in. Okta Workforce Identity Cloud Identity has become the organizational security linchpin, and…

Introducing Okta’s Secure Identity Assessment: Your path to reducing Identity debt

Identity has never been more important to securing the modern world. No two organizations are the same, and each faces unique security challenges. Addressing Identity debt has become critical to maintaining operational integrity. Organizations implementing a Zero Trust architecture enforce strict access controls and logging mechanisms, which can…

New enhancements to the Workforce Identity Cloud's unified security solution announced at Oktane 2024

Technology is unlocking opportunities and business outcomes like never before, but it’s also introducing complexity and potential risk for organizations.  When a biomedical engineering team spins up new AI models, they could drive business outcomes like accelerating a clinical trial for a new vaccine. At the same time, IT and security teams have…

Okta’s mission to standardize Identity Security

Identity is under attack. Over 80% of data breaches involve compromised Identity,* the main enterprise security entry point for workforce and consumer applications.  Lack of standardization is a major reason for this. Without a unifying industry standard for Identity Security that provides full visibility into every part of the technology stack,…

Okta advances device context features for Zero Trust security

In an era of increasingly sophisticated cyberthreats, organizations must operate on the premise that no user or device should be trusted by default. Every login attempt must be rigorously validated, including the secure state of the device requesting access. One of the cornerstones of Zero Trust is understanding the context of devices and…

Archive