security

Announcing Entitlement Management for Okta Identity Governance

Organizations of all sizes are adopting more SaaS applications than ever. According to Okta’s Businesses at Work Report 2023, the average Okta customer uses 89 different applications. Driving a least privileged access approach for each of these applications becomes even more complex when teams have to take into account each application’s unique…

Okta awarded the Palo Alto Networks 2023 Global Technology Partner Innovator of the Year

Okta is proud to be recognized as the Palo Alto Networks 2023 Global Technology Partner Innovator of the Year! These annual awards are presented to an elite group of Palo Alto Networks partners that, over the past 12 months, have excelled in one or more of the following areas: Performance: Bookings that partners initiate, the pipeline they build,…

Okta Privileged Access is generally available

We are thrilled to announce the general availability of Okta Privileged Access, our new privileged access management (PAM) offering, beginning this week. Okta Privileged Access is a powerful solution that elevates your security infrastructure and helps provide controlled access to your critical systems, applications, and data. This empowers your…

Digital native businesses: Pioneering the digital landscape securely with CIAM

What follows is an adaptation of an article from the second issue of Okta’s Identity Spotlight magazine. From food delivery to cryptocurrency, digital native businesses (DNBs) have grown exponentially over the past decade, driving economic growth and creating new jobs. According to International Data Corporation, DNBs are companies that use cloud…

Creating a secure environment for teachers and students to harness emerging technology

What follows is an adaptation of an article from the second issue of Okta’s Identity Spotlight magazine. Technology’s impact on the world of education is unquestionable. We’re a long way from the days of piles of notebooks, overhead projectors, and chalkboards. These days, technology plays a central role in the design and delivery of curriculum in…

Why you should migrate to OAuth 2.0 from static API tokens

  Static API tokens have long been used to call external APIs and access the resources of third parties such as software vendors. As API standards have evolved, OAuth 2.0 emerged as the option offering more robust security, greater flexibility, and a better developer experience. Let’s explore the advantages of moving away from static tokens in…

Artificial Intelligence for public good

When it comes to technology, there’s no arguing that the trend of the year is artificial intelligence (AI). AI is discussed simultaneously as the answer to — and the source of — all our problems. I know from my years of experience serving public sector organizations that it can be overwhelming when a new trend comes along. Suddenly, everywhere you…

Archive