Industry Insight

Industry Insight

Magic Links: Passwordless Login for Your Users

Magic links are a form of passwordless login. Instead of the user entering any login credentials to sign in, they are sent a URL with an embedded token via email, and sometimes via SMS. Once the user clicks that link to authenticate, they are redirected back to the application or system having successfully signed in—as if they used a “magic”…

What Is Best-of-Breed Technology?

“Best-of-breed technology” refers to the leading applications, systems, or software in a niche or category.  When organizations take a best-of-breed (or “best-in-breed technology”) approach to building their technology stack, it involves selecting various tools that serve specific purposes. Put another way, instead of purchasing a product suite…

Modernizing Government Agencies: Delivering Frictionless Experiences to Citizens, Quickly and Securely

Doing our errands looks a lot different now than it did a few years ago, and not just because of the COVID-19 pandemic (though that has certainly accelerated things). For a while now, we’ve been ordering groceries online, paying bills on a banking app, and even checking in with our doctor from the comfort of home. With so many digital experiences…

5 Reasons You Want an Out-of-the-Box Identity Service

Whether you’re building a new app or migrating a legacy app to the cloud, you face a choice: build everything in-house or selectively use out-of-the-box services to make the job easier and faster. Out-of-the-box services like Twilio, for messaging, and Braintree, for payments, have gained popularity because they help lean dev teams remain agile…

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorization credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

In the Age of Remote Work, Securing Office 365 Is a Must

According to our Businesses @ Work Reports, Microsoft’s Office 365 has ranked as the #1 most popular application within the Okta integration network for the last few years — both by number of customers and by number of monthly active users.   Top apps by number of customers - Businesses @ Work 2020 Top apps by number of monthly unique active…

Can Your CIAM Solution Keep Up with the Market?

The ability to innovate and rapidly scale digital experiences has never been so important to an organizations’ success as it is today. In fact, in a recent survey, 67% of organizations told us that they expect a substantial increase in traffic in the near future, and the majority (62%) attribute this rise to COVID-19. To help meet these growing…

Archive