The 10 Step Customer Identity Strategy Checklist

Do you know exactly what it takes to build a Customer Identity strategy? Read our 10-step checklist to help guide you to CIAM success. In a world where customer experience has overtaken price and product as the key brand differentiator, investing in customer identity and access management (CIAM) is a wise choice for any forward-thinking business…

What to Look for in a Modern Customer Identity Solution

The right CIAM solution is an asset to any modern business, but how do we identify what makes good customer identity? In this post, we explore the key features and capabilities every modern CIAM solution should offer.  The right customer identity and access management (CIAM) solution is an asset to any business. It ensures every digital…

Forum22: Europe’s Biggest Identity Event Returns to London

Trust is the glue that binds all business relationships together. It is the crucial element, ensuring organisations, their customers, workforces, partners, and suppliers can work productively and securely. But how can organisations build and maintain trust in an age when cyberattacks are at an all-time high and both workforce and customer…

Customers Recognise Okta as a Gartner Peer Insights™ Customers' Choice for Access Management for the Fourth Time in a Row

Our customers are our number one priority, and we immensely value every one of our 15,000+ customers around the world. High praise and trust from our customers are Okta’s ultimate barometers for success, which is why we are incredibly proud to be named a Customers’ Choice in the 2022 Gartner® Peer Insights™ “Voice of the Customer” report for…

How Do Conditional Access Systems Work?

What is conditional access? Your organisation’s applications and resources are being accessed daily by employees located in hundreds of different locations. At the same time, hackers and other cyber criminals are looking for ways to access your sensitive data themselves, trying to exploit gaps in your authentication process. Conditional access is…

The Advantages and Benefits of Single Sign-On (SSO)

Why is SSO so important? Single sign-on (SSO) is an increasingly useful tool for companies around the world. It allows all their employees, partners and customers to access the applications and services they need, all from one set of credentials. You may already know what SSO is, but do you know why it’s so important to thousands of businesses…

5 Ways a Modern Customer Identity Solution Can Help Your Business

In this post, we explore five ways a modern CIAM solution can help improve your customer experience and operational efficiency while strengthening your defences against surging cyberthreats. Robust security and seamless user-experience rarely go hand in hand. So if you want to build exceptional digital experiences for your customers, you need to…

What is the Role of IAM in Cloud Computing?

The post-Covid-19 business world doesn’t work without cloud computing, and cloud computing doesn’t work without IAM.  As the world reacted to the global pandemic back in 2020, organisations turned to technology to enable their workforce and respond rapidly to changing customer demands. Digital transformation roadmaps, originally plotted over…

Okta Concludes its Investigation Into the January 2022 Compromise

We have concluded our investigation into the January 2022 compromise of our third-party vendor. At the outset of our investigation, we focused on a five-day window of time, between January 16 and 21, when the third-party forensic firm, engaged by our vendor Sitel, indicated that the threat actor had access to their environment. Based on that…

Archive

Follow Us
Share on Linkedin Share on Youtube