enterprise security

Customer Identity Cloud enhancements to prevent account takeover

Recapping features introduced under the Okta Secure Identity Commitment to safeguard our infrastructure, our customers, and our customers’ customers Identity is under attack — by ransomware groups, nation-state actors, malicious insiders, and other cybercriminals — and, in recent years, it has emerged as the primary enterprise security entry point…

The Production Line: HealthInsight

Here at the The Production Line, we really enjoy digging into a little history. But this month, we’re pointing up a feature we just demoed at our Showcase event earlier this month. It’s called HealthInsight. This Early Availability (EA) feature started life as a beta in June of 2019, then was released as a self-enablement option in October, and…

5 Mistakes That Can Drive Up User Migration Costs

If you’re upgrading to new company software, a new operating system, or even moving from on-premises systems to the cloud, you’re thinking about user migration. User migration projects are rarely quick, nor easy, as they demand meticulous planning and attention to detail. However, with proper foresight and preparation, user migrations don’t need…

A CXOTalk With Todd McKinnon

Last week, our CEO Todd McKinnon sat down (or rather, “hung out”) with Michael Krigsman to discuss tech valuations, the future of identity management, and cloud and mobile adoption trends on a recent episode of CXOTalk. Okta is in an exciting period of growth for the company, with hundreds of employees, thousands of customers, and a new round of…

(Mis)understanding the Pace of Change in Enterprise Software

In a recent article in AllThingsD, Okta CEO Todd McKinnon, explains why the pace of change is so often misunderstood in enterprise software — and the implications that has for CEOs setting company strategy and VCs investing in new technologies. There are massive changes taking place in the enterprise, but legacy software is still a reality for…

Securing Layer 7 – Part 2: Application Vulnerability Management

I recently kicked off a blog series about the importance of securing Layer 7, otherwise known as the application layer in the OSI model. It’s a critical part of Okta’s security program because Layer 7 is closest to our users, and also because Okta’s cloud-based IDM solution integrates with on-premises and external SaaS identity stories, mobile…

Defining the Enterprise Cloud Service

The barrage of articles and blogs that cropped up following the personal identity hack on Wired’s Mat Honan got me thinking about the importance of security in the cloud. In my experience, what happened to Mat is not a unique issue. In fact, it’s actually a somewhat typical downside to – what I call – consumer cloud services. It was, no doubt, a…

How to Make Your Cloud App Ready for the Enterprise

IT’s job is harder now than it’s ever been. The reality of a hybrid on-premise and cloud environment has complicated and drastically changed IT’s role, forcing them to adapt for risk irrelevance. But what about the SaaS ISVs seeking to get in on the growth in enterprise cloud adoption? What’s the secret to building a successful, enterprise-ready…

Archive