MFA

3 On-Prem Security Myths Debunked

As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it. This trend applies to both…

4 ways Okta Access Gateway boosts security for on-prem resources

In 2019, we made the exciting announcement that Okta Access Gateway (OAG) is available to all of our customers. In that post, we described how Access Gateway helps businesses implement modern access management solutions like single sign-on (SSO) and adaptive multi-factor authentication (MFA) across their on-premises applications. The result is…

Centralized Access Management Needs to Be Secure and Selective

Give a kid free reign in a candy shop, and you know what will happen. They won't fill their bag with gummy bears alone—they’ll go for a mix of different treats! Gummy worms, sour patches, peanut butter cups, M&Ms, you know the list. Much like a kid in a candy shop, the modern employee now demands the freedom to use best of breed applications…

We’re Looking at the Future, and It Doesn't Have Passwords

We’re rapidly moving towards the enterprise of the future—but what does that look like? It could be a place where employees have intelligent interactions with machines, or an environment where commuting becomes obsolete because we can show up to meetings as holograms. No one can say for sure what the future looks like—but based on today’s trends,…

3 Data Breach Myths Debunked

As the ever-shifting security and threat landscape continues to evolve, it can be tough to distinguish security fact from fiction. Some common data breach misconceptions can seriously misinform your organization’s security strategy. In this post, we’ll touch on three of the most common data breach myths, and share some information on why they don…

How Much Are Password Resets Costing Your Company?

Your users are trying to hit deadlines, prepare for meetings, and balance responsibilities. They don’t want to slow down to gain access to the apps and systems they need to get their job done. Yet often, users are frustrated by the expectation of memorizing the dozens of URLs, usernames, and passwords they need to do their work. Most people can’t…

Dogfooding Chronicles: How Okta uses Okta

In this episode of the Dogfooding Chronicles, we want to go into the basics, and navigate you through Okta IT’s own use cases at a high level, stepping you through our environment and processes. We want to orient you to understand why we make the technology choices that we do. Our hope? You find this information so helpful, you’ll use some of it…

How FIDO2 + WebAuthn Offer a Seamless, Secure Login

For those not familiar with FIDO2, it is an improved version of the FIDO standard – popularly known for the U2F USB tokens provided by Google and Yubico. Now that we've explored what Webauthn is and reviewed critical Webauthn building blocks and protocols, I’ll use this post to break down how you can leverage WebAuthn with FIDO2 to enhance both…

Archive