Technology

Technology

Identity + M&A: A Q&A with Forrester Research

The role of technology in today’s M&A projects is a critical factor in driving a successful M&A – organizations need to consider how to use technology to ensure a secure, but practical and seamless transition in giving user’s day one access to corporate resources. Identity and access management is a key component in ensuring that your…

Explore Using JWTs for CSRF and Microservices

Motorcycle Fun Fact: Did you know that if you want to negotiate a right curve on a motorcycle, you start by nudging the handlebars to the left? This is called countersteering. The initial push to the left causes the motorcycle to lean to the right. Last year, Micah Silverman embarked upon a Java Roadstorm on behalf of Stormpath. He toured a solid…

Okta​ ​Today​ ​and​ ​Tomorrow:​ ​Going​ ​Beyond​ ​Internal​ ​Access​ ​Management

Here at Okta, we recently carved out core enhancements across four major components our the product, which we shared at Oktane17 in August. Your identity solution needs to be future-proof – connecting to everything you need today and backed by a team that will ensure it connects to the apps, devices, and tools your team will need in future as well…

Making the Multifactor Authentication Transition: 3 User Access Management Considerations

As business operations move to the cloud, companies are increasingly switching to Multi-Factor Authentication (MFA) to secure their applications. After all, when business can be done from anywhere, and employees may need hundreds of different digital tools and services, security is a major concern. With new software comes new practices, and it’s…

How to Extend Active Directory to Office 365 with Okta

It’s no secret that Microsoft has successfully launched a shift into the cloud. With SaaS apps like Office 365 taking over the workforce—a product with 39% adoption among Okta users, and the most widely used application in our Okta Application Network—there’s never been a better time to move your company into the cloud and into the future. However…

How Companies Need to Set Up Privileged Access Management

Let’s face it—your network is under attack. You might not know who, you might not know when, but you do know that they are coming. The Petya ransomware, WannaCry, and Democratic National Committee email hacks all point to the fact that network security breaches are here to stay. A large breach of sensitive information (like the ones at Target and…

How Okta Integrates Into Active Directory (and 5 Benefits for IT)

Microsoft’s Active Directory (AD) is critical in a distributed network for identity management to providing a single source of truth. However, it comes with heavy drawbacks, particularly the hidden and ever-increasing costs in time. After initial installation and configuration for AD, every application needs to be connected and maintained, users…

Using Okta Adaptive MFA for PCI 3.2

PCI DSS, or the Payment Credit Industry Data Security Standard, is an industry regulation that applies to any company that accepts credit cards for payments processing. The goal of the standard is to establish best practices in securing consumer information to prevent broad scale breaches of credit card and personal information. As identity is…

Archive