Identity and Access Management

Identity and access management (IAM) tools connect users to the systems and tools they rely on, easing experience for users, menial tasks for IT, and security for both. As the leading provider of identity for the enterprise, Okta has much to say about IAM. Here’s a sample of our thoughts.

Okta and Google Chrome Enterprise: Enhanced application protections with device assurance

As the digital landscape evolves, the need for robust security measures becomes increasingly critical. Organizations are constantly exploring innovative ways to ensure secure access to their systems and data. In this pursuit, Okta has taken a significant step forward by integrating its device assurance policies with Google's Device Trust Connector…

Why Okta is Privacy-Forward

Last week Okta celebrated Data Privacy Week with a company-wide campaign to reinforce employee awareness of the importance of respecting privacy and safeguarding personal data. This got me thinking about how data protection and privacy have never been more relevant to individuals around the world. We’ve never spent more time online or been so…

Is Establishing a Robust IAM Practice Tactical or Strategic?

Verizon’s 2021 Data Breach Investigations Report found that privilege abuse is still the leading cause of breaches today. As cyber-attacks targeting identity (such as business email compromise or phishing) have become more sophisticated and numerous, many organizations are increasing their focus and budgets to combat them using Identity and Access…

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

5 Reasons You Want an Out-of-the-Box Identity Service

Whether you’re building a new app or migrating a legacy app to the cloud, you face a choice: build everything in-house or selectively use out-of-the-box services to make the job easier and faster. Out-of-the-box services like Twilio, for messaging, and Braintree, for payments, have gained popularity because they help lean dev teams remain agile…

Okta + Unicon: Enhancing Success and Security for Campus Communities

Many of today’s colleges and universities still rely on costly, outdated legacy systems to provide students, staff, and alumni with access to their resources—severely impacting user experience as a result. However, in the same spirit of continuous improvement these schools use to educate their students, that trend is shifting: 62% of education…

A Leading Identity Conference: What to Expect at Oktane20

Update: March 5 Every year at Oktane, we look forward to bringing together thousands of IT professionals, product leaders, and developers to discuss the importance of identity. As we’ve followed the spread of the coronavirus disease 2019 (COVID-19), it became clear that, this year, the best way to safely engage with our community is through a…

How to Enforce Least Privilege Access on Linux Servers Using Sudo

Security is and should be outcome-oriented. In that spirit, access management can be boiled down to a single phrase—ensuring that only the right people have the right levels of access to the right resources under the right conditions at the right time. In a true Zero Trust world, granting access through the front door isn’t enough, you also need…

Archive