Company + Product

Company + Product

Tools for enforcing authentication policy

As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.  Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…

How Okta fosters a security culture

Jen Waugh joined Okta in May 2024 as Senior Director, Security Culture. One of Jen’s primary responsibilities is to apply her wealth of experience — spanning cybersecurity, governance, compliance, and leadership — to create and foster a security culture as a driving force behind Okta’s continued maturation as a security company. Recognizing that…

Identity Threat Protection with Okta AI

…now Generally Available A matter of Identity Security In today’s increasingly cloud-based world, Identity is the first, and in many cases, only persistent fingerprint enabling a user’s access to assets in the organization. As the control plane, Identity spans across the enterprise IT tech stack and intersects the data or access planes of device,…

Okta Workflows joins the Okta Developer Forum

For years, Okta Workflows has had a thriving community of customers who have built flows and connectors for their orgs, solving simple and complex IT and security use cases at scale. We often see customers facing the same challenges and eagerly building their own solutions, workflows, and connectors, which spurs new innovation. The Workflows…

Archive