Universal Directory

One place to manage all your users, groups and devices. That’s what Universal Directory offers: huge time and effort savings. For a business world increasingly concerned with authentication and identity management, the tool offers a transformative approach to cumbersome directory challenges. Find out more.

Tactical Identity Bridge Appliance: How the U.S. Government can extend Okta to the tactical edge

Many federal organizations are meeting cloud computing strategies for persistent access to information by leveraging software-as-a-service (SaaS) technology for their enterprise mission use cases. For the U.S. Department of Defense (DoD), enabling cloud innovation must support data to and from various environments. DoD’s mission capabilities are…

How Okta Users API Enables Truly Agile IT and People Ops

Large companies often deal with complex org structures that challenge both their IT and People Ops teams. We see, for example, large customers composed of multiple, independently-managed business units or regional offices operating independently from one another. These organizations face heterogeneous regulatory environments and tend to make…

Unified Identity Is The New Perimeter

Executive summary The lines between users inside and outside your organization are blurring. Modern organizations are finding it advantageous to consolidate and simplify Identity structures to provide all users the information they need, where and when they need it. SecureITsource and Okta have partnered to take a closer look at real customers and…

Cloud-First Agility to Securely Remote Enable Your Workforce

In my previous blog, I introduced the concept of why hybrid, cloud-first, identity solutions are fundamentally different from those with an on-premises-first focus, providing you with a huge competitive advantage. Over the next few blog posts, I’ll be digging deeper into these differences, and detailing the advantages you’ll get by adopting Okta’s…

What Is a Data Breach?

A data breach happens when cybercriminals gain unauthorized access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…

Customer Stories: How Two Companies Retired Active Directory

More than ever, today’s businesses are looking for technology that’s remote ready, cost-effective, and competitive. And as legacy solutions fail to meet these expectations, many companies are exploring modern alternatives that enhance agility, productivity, and security. This is particularly true with Active Directory (AD), Microsoft’s 20-year-old…

Rethinking AD: The Four Stages of Separation, Part 2

In part one of The Four Stages of Separation from Active Directory (AD), we covered stages 1 - 3: 1. Where are you today? 2. Make sure you’re safe, and 3. Get everyone together. In part 2, we’ll cover Stages 4.1 and 4.2, and we’ll describe a few customers who started this journey and detail where they are today. Still wondering why you should…

Rethinking AD: The Four Stages of Separation, Part 1

In the first blog of this series, we explained why it’s time to break-up with Active Directory (AD). In the second, we listed the top five things you can look forward to after making the change. So now we’re breaking down the four stages of separation you’re going to experience as you reduce your dependency on, and potentially leave, Active…

Archive