Introducing Code Tycoon: A Developer-Inspired Game From Okta

As a software developer, it’s your job to build exciting applications and features. But more often than not, your time is spent fixing other people’s technical problems rather than focusing on the tasks that will drive the business forward. Raise your hand if you never again want to reset a password or help install a desktop program.  Those are…

Okta Joins the ID2020 Alliance

If you’re reading this on any kind of digital device, you probably use various forms of digital identity on a regular basis. From accessing healthcare to participating in democracy to protecting our finances, modern life requires identity.  For most of us, it’s impossible to imagine how we’d live our lives without verifiable identification. Yet,…

It’s Official: Okta Joins Forces With Auth0

At Okta, we’ve spent the past 12+ years focused on transforming cloud-based identity and empowering everyone to safely use any technology. Today marks a significant milestone for our team and acceleration of our journey: Okta and Auth0 are now one team. We’ve successfully completed the acquisition. I’ve long admired the impressive platform and…

What Is Identity and Access Management (IAM)?

Identity and access management (IAM) is a framework that enables organisations to ensure only the right people and devices have access to the right applications, resources, and systems at the right time. IAM encompasses the various policies, services, and technologies that allow organisations to verify every user’s identity and level of access at…

Okta’s Redesigned End User Dashboard - Now 50% Faster!

You’ll often hear our CEO and co-founder, Todd McKinnon, talk about how our mission at Okta is to connect users to their technologies. An important part of how we do this is through the Okta End User Dashboard, a modern web portal that makes it simple and secure for end users to quickly get access to their applications.  With a single click, users…

Okta’s Redesigned Admin Console and Dashboard — Now in EA!

Our customers often tell us that one (of the many) things they love about Okta is our admin experience. They love having a single place to orchestrate all identity and access management needs. No more jumping between different tools and screens to manage users or secure their access. They love the simplicity of our out-of-the-box configurations…

CCPA vs. GDPR: Similarities and Differences Explained

The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are laws that emerged to give individuals greater power over their personal information. Both regulate organisations that collect and use data in a variety of ways. A brief summary of the CCPA: Gives California residents increased transparency and control…

Exploring the symbiotic relationship that is Digital Trust

Okta recently published the Digital Trust Index. The whitepaper explores the notion of how trust is built, maintained and broken in a digital world, by capturing the sentiments of more than 13,000 office workers. Understanding digital trust means examining its three related facets: ability, reliability and truth. Belief that someone or something…

Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?

Being authentic is a high term of praise—if we think people are authentic, we believe them to be trustworthy, loyal, and dependable. There's a similar concept in computer security. Business networks are crucial to protect, so firms want only authorised people accessing them. In cybersecurity, authentication means verifying that a person or device…

Archive

Follow Us
Share on Linkedin Share on Youtube