Identity and Access Management

Identity and access management (IAM) tools connect users to the systems and tools they rely on, easing experience for users, menial tasks for IT, and security for both. As the leading provider of identity for the enterprise, Okta has much to say about IAM. Here’s a sample of our thoughts.

Innovation ignited: How product leaders fuel innovation with digital Identity

As champions of product innovation and customer experience, chief product officers, directors, and strategists play a strategic role in delivering products that make it easy for customers to solve their everyday challenges. However, competition in the SaaS industry is fierce. Unique features serve as competitive differentiators, but customers and…

Innovation ignited: How security leaders enable innovation with Identity

Chief information officers, directors, and other security leaders must walk a fine line between protecting data and ensuring authorized users have seamless access to tools and services. Their Identity and authentication strategies are responsible for proactively mitigating and remediating threats in a way that protects users’ trust. However,…

Spotlight on Preston King: A pillar of support, innovation, and leadership in the “What’s Next” program

In the face of a growing cybersecurity skills gap, Okta’s What’s Next program creates opportunities for individuals to upskill, reskill, and make a meaningful impact in the field of Identity and Access Management (IAM).  One of the program’s most exceptional participants is Preston King, a dedicated, highly technical, and collaborative individual…

Tools for detecting and responding to potential threats post authentication

If a data breach happens at your organization,  you can’t afford to compromise on the speed and efficacy of your response. For the best possible defense against cybersecurity threats, security leaders need a comprehensive approach to Identity-powered security that supports risk mitigation in scenarios when would-be attackers have already exploited…

Tools for enforcing authentication policy

As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.  Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…

Archive