CIAM

Customer identity and access management (CIAM) is a major topic in business today, and with good reason: if your clientele doesn’t feel secure using your products and services, they probably aren’t going to engage at all. CIAM solutions include Single Sign-On and Adaptive Multi-factor Authentication, among others. Read on to learn more.

Magic Links: Passwordless Login for Your Users

Magic links are a form of passwordless login. Instead of the user entering any login credentials to sign in, they are sent a URL with an embedded token via email, and sometimes via SMS. Once the user clicks that link to authenticate, they are redirected back to the application or system having successfully signed in—as if they used a “magic”…

Modernizing Government Agencies: Delivering Frictionless Experiences to Citizens, Quickly and Securely

Doing our errands looks a lot different now than it did a few years ago, and not just because of the COVID-19 pandemic (though that has certainly accelerated things). For a while now, we’ve been ordering groceries online, paying bills on a banking app, and even checking in with our doctor from the comfort of home. With so many digital experiences…

Securing Data Across APAC: Achieving APEC PRP Certification

At Okta, trust and transparency are core to who we are as a company. These values critically inform the way we view our responsibilities to our customers and to the personal data of their users that they entrust to Okta. The keystone of our transparency is providing our customers with a clear understanding of how we collect, process, and secure…

Can Your CIAM Solution Keep Up with the Market?

The ability to innovate and rapidly scale digital experiences has never been so important to an organizations’ success as it is today. In fact, in a recent survey, 67% of organizations told us that they expect a substantial increase in traffic in the near future, and the majority (62%) attribute this rise to COVID-19. To help meet these growing…

What Is Social Login and Is It Worth Implementing?

Social login, also known as social sign-in or social sign-on, uses information from social networking sites to facilitate logins on third-party applications and platforms. The process is designed to simplify sign-in and registration experiences, providing a convenient alternative to mandatory account creation. For users, social login is a…

Okta One-Minute Case Study: Cengage

The ambition of bringing innovation to education is nothing new. And when it comes to how students access learning materials, technology has made big advances in the last 25-30 years. How educational publishers have provided those digital materials, however, has traditionally been in-house and ad hoc, built by internal IT support teams. But…

What Is Biometric Authentication?

Biometric authentication is a security process that compares a person’s characteristics to a stored set of biometric data in order to grant access to buildings, applications, systems, and more. With cybercrime, fraud, and identity theft on the rise, it’s more important than ever for businesses to help customers and employees verify their identity,…

Archive