CIAM

Customer identity and access management (CIAM) is a major topic in business today, and with good reason: if your clientele doesn’t feel secure using your products and services, they probably aren’t going to engage at all. CIAM solutions include Single Sign-On and Adaptive Multi-factor Authentication, among others. Read on to learn more.

Can Your CIAM Solution Keep Up with the Market?

The ability to innovate and rapidly scale digital experiences has never been so important to an organizations’ success as it is today. In fact, in a recent survey, 67% of organizations told us that they expect a substantial increase in traffic in the near future, and the majority (62%) attribute this rise to COVID-19. To help meet these growing…

What Is Social Login and Is It Worth Implementing?

Social login, also known as social sign-in or social sign-on, uses information from social networking sites to facilitate logins on third-party applications and platforms. The process is designed to simplify sign-in and registration experiences, providing a convenient alternative to mandatory account creation. For users, social login is a…

Okta One-Minute Case Study: Cengage

The ambition of bringing innovation to education is nothing new. And when it comes to how students access learning materials, technology has made big advances in the last 25-30 years. How educational publishers have provided those digital materials, however, has traditionally been in-house and ad hoc, built by internal IT support teams. But…

What Is Biometric Authentication?

Biometric authentication is a security process that compares a person’s characteristics to a stored set of biometric data in order to grant access to buildings, applications, systems, and more. With cybercrime, fraud, and identity theft on the rise, it’s more important than ever for businesses to help customers and employees verify their identity,…

Spring Cleaning for the Enterprise: Reduce Complexity, Cost, and Vendors

As they strive to meet the demands of today’s technical landscape, there’s a new challenge arising for the world’s largest organizations. These external demands can be summed up in 3 pressing imperatives that all enterprises must embrace: Deliver on modernize IT initiatives Create secure and seamless customer experiences Adopt a zero-trust…

Rethinking AD: The Four Stages of Separation, Part 2

In part one of The Four Stages of Separation from Active Directory (AD), we covered stages 1 - 3: 1. Where are you today? 2. Make sure you’re safe, and 3. Get everyone together. In part 2, we’ll cover Stages 4.1 and 4.2, and we’ll describe a few customers who started this journey and detail where they are today. Still wondering why you should…

Rethinking AD: The Four Stages of Separation, Part 1

In the first blog of this series, we explained why it’s time to break-up with Active Directory (AD). In the second, we listed the top five things you can look forward to after making the change. So now we’re breaking down the four stages of separation you’re going to experience as you reduce your dependency on, and potentially leave, Active…

Archive