Bot Detection

Customer Identity Cloud enhancements to prevent account takeover

Recapping features introduced under the Okta Secure Identity Commitment to safeguard our infrastructure, our customers, and our customers’ customers Identity is under attack — by ransomware groups, nation-state actors, malicious insiders, and other cybercriminals — and, in recent years, it has emerged as the primary enterprise security entry point…

CIAM by example in four recipes: Prevent fraudulent activity

This recipe is part of the series Learn CIAM by example: Four recipes to improve your app’s security and UX. You can learn more about the series by downloading our four recipes in a cookbook format. In this recipe, you learn how to use CIAM to prevent fraudulent sign-ups and account takeovers. Fraudulent activity on the web can happen on any…

Go beyond the login box with Customer Identity Cloud

Pay a bill. Chat with friends. Order food. Browse clothes. Plan a trip. Laugh at cat videos. In the digital world, much of what we do, where we turn for information, and even how we decompress happens on the other side of a login box.  From initial signup to every login, Customer Identity is the digital touchpoint customers repeatedly encounter as…

Archive