Industry Insight

Industry Insight

Use Okta to Access Microsoft Powershell on-Prem? Yes, You Can.

Since its beginnings, the vision for Okta has been to enable any company to use any technology—that promise includes use of the ubiquitous Powershell code in enterprise environments through the Okta platform.  Microsoft Powershell is commonly used as part of the Joiner, Mover, Leaver identity-centric business processes to manage Microsoft…

Making 2021 the Year of Rapid Innovation

There’s no question that 2020 will go down in history as an unprecedented and challenging year. But in spite of this—or even because of it—we’ve seen several breakthroughs in science and technology. Take the vaccines that have been developed to combat COVID-19. Before the pandemic, there had never been a vaccine created in under a year, nor one…

What if… You Didn’t Lose Sleep Over Remote Work Security?

When COVID-19 arrived in March, organisations were forced to make quick decisions around remote work security. While those early security measures may have worked well as a stopgap, some companies are discovering those solutions won’t work long-term. Other companies are shifting towards a dynamic work model—a transformation that comes with…

How to Deliver Great Customer Experience Into the Future

Last year, we learned how to manage uncertainty. Physical distancing, health and safety requirements, and disrupted supply chains have all determined how we’ve lived, worked, and interacted with each other. And it’s only reasonable to expect an increased reliance on digital interactions even after the world returns to “normal.” The past year has…

What is Decentralised Identity?

Decentralised identity, often used interchangeably with “self-sovereign identity” (SSI), is gaining ground as an alternative to today’s centralised and federated infrastructures. In short, it allows individuals to manage their own identities. In a decentralised framework, the user receives credentials from a number of issuers (e.g., government,…

Scaling to Meet Demand: Why Customer Experience Needs Modern CIAM

Throughout the pandemic, offline channels have been especially vulnerable to uncertain demand, shifting safety guidelines, and economic pressure—and as a result, customer experience (CX) now largely belongs to the virtual world. However, as customers and citizens rely increasingly on digital and remote operations, organisations will be challenged…

The Future of Customer Identity: 4 CIAM Trends to Watch Out For

Technology moves fast. You know better than anyone that the solutions that were implemented a year ago won’t necessarily work today, and that customers continuously expect more refined standards of service. To lead the pack, you need to provide customers with the right balance of usability and security—seamless, intuitive digital experiences that…

What Are ICAM and FICAM?

For organisations and government agencies alike, strong identity management is paramount. Millions of people share sensitive, personal information with commercial and public bodies every day, so companies and public sector agencies have a responsibility to secure their assets.  This is where ICAM and FICAM come in. What is ICAM? Identity,…

What Is SMS Authentication and Is It Secure?

SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…

Archive