Here at the The Production Line, we really enjoy digging into a little history. But this month, we’re pointing up a feature we just demoed at our Showcase event earlier this month. It’s called HealthInsight. This Early Availability (EA) feature started life as a beta in June of 2019, then was released as a self-enablement option in October, and…
As I discussed in my previous post, Okta’s Risk-Based Authentication feature helps organizations overcome the challenges of balancing security with usability. You may have heard a lot about Risk-based Authentication over the past couple of months, and now that Risk-Based Authentication is Generally Available, I want to give an updated overview of…
The busier people get in their personal lives, the more convenient it becomes to offload tasks like cooking, shopping, or cleaning. Similarly, the bigger an organization becomes, the more likely they are to offload the likes of cleaning services, legal obligations, and accountancy administration to third-party organizations. In today’s digital…
Most of us are now familiar with the term “Zero Trust”, seeing it emblazoned on many a booth and bus at security conferences throughout the year. The term has certainly reached buzzword status, and with good reason: today, security leaders recognize more than ever the need to move away from a perimeter-oriented approach to security.
But putting a…
Today, analyst firm Forrester published The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Platform Providers, Q4 2019*, which recognized Okta as a Leader in the Zero Trust security market. The report also recognized Okta as having the highest possible score in the evaluation criteria of “people/workforce security,” “automation and…
Our people are our identity, and we’re fortunate enough to have a vibrant, passionate group of them. Our final core value is to “Empower our people” to be their best selves, both inside and outside of the workplace. Alice Marsh, recruiting coordinator hiring in EMEA, embodies this core value through focusing on a candidate’s whole journey and…
In this edition of The Dogfooding Chronicles, we’re going to highlight an implementation we’re very excited about around here. Ever heard of WebAuthN? Read on to learn some tips and tricks we’ve learned in our WebAuthN enablement journey.
Setting the stage – what is WebAuthN?
Web Authentication API, aka WebAuthN, is one of the newest web…
Love it or hate it, paying taxes is a staple of life for people all over the world. Disclosing and proving payment of those taxes to the government is an equally accepted practice—you can’t simply assume they know you are doing so. Similarly, when it comes to compliance, it’s vital for companies to prove to governing bodies that they are…
Imagine this: you’re in your house, and you notice some water coming through the ceiling. One of your pipes is leaking. To fix it, you call your plumber to change the pipe, a handyman to patch up the ceiling, and a painter to cover the spackle. Once they’re done with their work and you walk them out of your house, you need to ensure they no longer…
In 2018, hackers stole half a billion records—an increase of 126% on the year prior, which translates to 3.8 million records per day. Ransomware is an ever-increasing threat, geopolitical tensions are being played out online, and corporate and government security systems are struggling to compete with the sophisticated modern cybercriminal.
To…