Microsoft’s Active Directory (AD) is critical in a distributed network for identity management to providing a single source of truth. However, it comes with heavy drawbacks, particularly the hidden and ever-increasing costs in time. After initial installation and configuration for AD, every application needs to be connected and maintained, users…
PCI DSS, or the Payment Credit Industry Data Security Standard, is an industry regulation that applies to any company that accepts credit cards for payments processing. The goal of the standard is to establish best practices in securing consumer information to prevent broad scale breaches of credit card and personal information.
As identity is…
Identity may be a difficult-to-define concept that has stumped philosophers for centuries. But when it comes to security offline or online, the topic boils down to evidence and proof. What determines that someone is who they claim to be? In the physical world, that question is generally answered by people providing various forms of identification…
Our fifth annual customer conference Oktane17 is just a month away and I’m looking forward to seeing you all there. Oktane has always provided an opportunity for you — our customers — to learn from each other, get hands-on training, and discuss how you’re solving your most critical challenges. And this year’s theme, “all you,” focuses on how you…
The future of Identity and Access Management is changing. Where Access Management (AM) was once one of many components of the legacy IT stack, it is shifting to the central role in how companies will modernize and manage IT – using identity to drive transformational change across all aspects of their business.
AM has already started to evolve in…
Regardless of exactly how data breaches occur, the culprit is almost always weak or stolen passwords. According to the Verizon 2017 Data Breach Investigations Report, they account for 81% of all breaches.
The result of this, according to a new IDG survey sponsored by Okta, is that 74% of IT and security leaders have flagged identity and access…
We recently spoke to the CIO of a large healthcare provider whose top priority this year is “restoring joy to the medical profession.” His goal is to eliminate the friction caused by the technical burden of adopting and maintaining IT systems. Unfortunately, these processes often fall on healthcare professionals (HCPs). They answer emails, log…
Since the early days of computing, users have inputted passwords to prove their identities. Today, as computers have progressed to something in everyone's pocket, password management is changing. No longer is having memorized an over-long string of numbers and letters the hallmark of a sophisticated user. Instead, authentication at the cutting…
The world of Identity and Access Management (IAM) is rarely controversial. But today, there is a battle brewing in how we - as an industry - talk about customer-facing use cases for IAM. Many are starting to refer to this as Customer IAM or Consumer IAM, both abbreviated as CIAM.
CIAM does have some unique requirements. But that does not mean that…