access management

Okta Identity Governance: Modern, Cloud-Based IGA

Since the 2000s, companies have turned to Identity Governance and Administration (IGA) software to achieve automation and compliance outcomes. But the traditional IGA systems we’ve come to know have been costly, complex, and designed for on-premises applications and infrastructure. They simply don’t meet the needs of today’s dynamic, remote…

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

Okta + Unicon: Enhancing Success and Security for Campus Communities

Many of today’s colleges and universities still rely on costly, outdated legacy systems to provide students, staff, and alumni with access to their resources—severely impacting user experience as a result. However, in the same spirit of continuous improvement these schools use to educate their students, that trend is shifting: 62% of education…

When to Retire the Monolith: Is a Move to Microservices in Your Future?

We’ve seen monumental changes in personal computing over the past few decades. The more sophisticated a device becomes, the more compact its design and the more advanced its capabilities. Take mobile phones: their first iterations were cumbersome and slow compared to the sleek, fast smartphones we now carry in our pockets. And modern-day laptops…

Understand Web Access Management—Then Move On

Figuring out how to secure users’ connections to applications is an age-old challenge that has developed alongside the digital transformation of the enterprise. Traditionally, businesses have addressed this issue with complex authorization systems, many of which used web access management (WAM)—or on-premises single sign-on (SSO)—at the center of…

Contextual Access Management: What Does It Actually Mean?

Today’s teams get the job done from wherever they need to and on whichever device they prefer. Their workplace may be within the traditional office environment, but it can also be at home, in a coffee shop, at a client site, or even a combination of these on any given day. The range of endpoints teams use—whether a laptop, a tablet, a mobile phone…

Okta​ ​Today​ ​and​ ​Tomorrow:​ ​Going​ ​Beyond​ ​Internal​ ​Access​ ​Management

Here at Okta, we recently carved out core enhancements across four major components our the product, which we shared at Oktane17 in August. Your identity solution needs to be future-proof – connecting to everything you need today and backed by a team that will ensure it connects to the apps, devices, and tools your team will need in future as well…

Archive