security

The Secret Features of Okta Access Gateway: Part 2: On-Prem Data Sources

At Okta, we love to secure access to everything, from cloud apps, to consumer apps, to servers, and infrastructure—from a single platform. And that, of course, includes on-premises apps. In our new series The Secret Features of Okta Access Gateway, we’re going to explore some of the best secret features of Okta Access Gateway (OAG) to secure…

3 On-Prem Security Myths Debunked

As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it. This trend applies to both…

AI Is Changing Security—Here’s How

Cybercriminals have evolved from lone hackers targeting small websites and systems into dangerous entities launching large-scale cyberattacks that affect millions of people worldwide. In recent years, we’ve seen multiple huge ransomware attacks like WannaCry and NotPetya cause hudereds of millions or even billions of dollars in damages and lost…

Understand Web Access Management—Then Move On

Figuring out how to secure users’ connections to applications is an age-old challenge that has developed alongside the digital transformation of the enterprise. Traditionally, businesses have addressed this issue with complex authorization systems, many of which used web access management (WAM)—or on-premises single sign-on (SSO)—at the center of…

Empower Employees to Become First Responders with UserInsight

As cybercriminals become more refined in their quest to access workforce credentials, today’s businesses are under ever-increasing pressure to implement systems, tools, and processes that protect their sensitive data. These features need to be able to secure their employees without overburdening IT with excessive monitoring tasks. This is a tricky…

Why Your Customers Need Passwordless Authentication

In today’s threat landscape, passwords have become increasingly ineffective for protecting customer authentication and data—and they’re also unintended inhibitors for user experience. As such, it’s not surprising that many organizations are exploring passwordless authentication as a more secure, user-friendly alternative. In our previous post in…

How to Enforce Least Privilege Access on Linux Servers Using Sudo

Security is and should be outcome-oriented. In that spirit, access management can be boiled down to a single phrase—ensuring that only the right people have the right levels of access to the right resources under the right conditions at the right time. In a true Zero Trust world, granting access through the front door isn’t enough, you also need…

Taking in the 2019 NASCIO Conference: How We’re Helping Government Agency CIOs Stay Secure and Compliant

Having just attended and sponsored the 2019 National Association of State Chief Information Officers (NASCIO) Annual Conference in Nashville, I was struck, though not surprised, by the prevalence of security-related themes throughout the event. Many of the discussions among presenters and attendees centered on topics such as ransomware, identity…

The Production Line: HealthInsight

Here at the The Production Line, we really enjoy digging into a little history. But this month, we’re pointing up a feature we just demoed at our Showcase event earlier this month. It’s called HealthInsight. This Early Availability (EA) feature started life as a beta in June of 2019, then was released as a self-enablement option in October, and…

Archive