Industry Insight

Industry Insight

What Is SMS Authentication and Is It Secure?

SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…

Strengthening Customer Experience in a Time of Recovery with Identity

It’s no secret that customer behavior is constantly evolving. But the changes we’ve seen in the last seven months and the acceleration of customers adopting digital-first experiences for nearly every aspect of their life is unprecedented. And this trend is only going to continue, creating a need for customers to navigate digital touchpoints in a…

What Is Identity Governance and Administration?

Identity governance and administration (IGA) is a policy-based approach to identity management and access control. As the name implies, IGA systems merge identity governance and identity administration to provide additional functionality beyond traditional identity and access management (IAM) tools. Particularly, they offer valuable support in…

Modernizing Government Agencies: How Okta Can Help Build Secure and Scalable Citizen Experiences

We often share personal information to obtain the services we need, be it healthcare, financial assistance, or legal advice. In doing so, we place trust in our service providers to keep this data confidential and secure—often without hesitation. When interacting with government agencies, however, we’re usually less confident. By design, agencies…

What Is an API?

API is an acronym that stands for “application programming interface,” and it allows apps to send information between each other. While there are numerous protocols and technologies involved, the underlying purpose of APIs is always the same: to let one piece of software communicate with another.  APIs (sometimes described as web services) work in…

It’s Time to Look Beyond Covid—But How Far Can We See?

No, we don’t have a crystal ball. And in such cases, in lieu of making predictions, it’s smarter to start asking questions. So we partnered with Pulse to ask IT executives from some of the world’s largest organizations exactly what they were thinking, and what keeps them up at night about business and technology after Covid-19. Read on to glean a…

What Is Attribute-Based Access Control (ABAC)?

Attribute-based access control (ABAC) is an authorization model that evaluates attributes (or characteristics), rather than roles, to determine access. The purpose of ABAC is to protect objects such as data, network devices, and IT resources from unauthorized users and actions—those that don’t have “approved” characteristics as defined by an…

Archive