In order to gain more control over their access to AWS resources, Okta administrators often need to create numerous AWS roles. This allows them to manage which users have access to sensitive and/or expensive AWS resources.
The challenge this creates is the screen below, where, throughout the day, users need to switch between various roles to get…
In today’s threat landscape, passwords have become increasingly ineffective for protecting customer authentication and data—and they’re also unintended inhibitors for user experience. As such, it’s not surprising that many organizations are exploring passwordless authentication as a more secure, user-friendly alternative.
In our previous post in…
Thanksgiving is almost upon us, and there are few things more traditional than sitting down with friends and family for a delicious meal—or waiting in a grocery line for its ingredients. And while we’re all for tradition, today, many opt for a hassle-free online shopping experience. Albertsons Cos. knew this and used Okta to make sure they could…
The holiday season means different things to different people, but some aspects of it are universal: reconnecting with family and friends, eating great food, and taking the time to unwind from work. At Okta, the holidays are also a chance for us to look back at the data we’ve gathered from our more than 7,000 customers, and 6,000 apps and…
Lauren Wagner, senior manager of marketing technology and operations, leads one of the most cross-functional teams in Okta’s marketing organization. In this edition of the Day in the Life series, learn how Lauren empowers her team and the marketing organization to bring systems to life.
How did you find out about Okta?
At my last company we used…
Enterprises have traditionally relied on passwords to log their employees into their accounts and services—but the practice is coming under increased scrutiny due to more modern and secure passwordless alternatives.
In a previous post, we explored how businesses can adopt passwordless authentication through alternatives like factor sequencing,…
Security is and should be outcome-oriented. In that spirit, access management can be boiled down to a single phrase—ensuring that only the right people have the right levels of access to the right resources under the right conditions at the right time.
In a true Zero Trust world, granting access through the front door isn’t enough, you also need…
Okta has long been the leader in Identity and Access Management for workforce use cases, driven by the massive shift towards best-of-breed, cloud adoption. But an even larger shift is upon us as every company races to become a technology company, reimagining their customer-facing digital experiences in the process. Against this backdrop, identity…
Having just attended and sponsored the 2019 National Association of State Chief Information Officers (NASCIO) Annual Conference in Nashville, I was struck, though not surprised, by the prevalence of security-related themes throughout the event. Many of the discussions among presenters and attendees centered on topics such as ransomware, identity…
In our first blog, we asked you to consider finally breaking up with Active Directory (AD), and to ponder why you’ve tolerated its limitations and shortcomings for so long. Ask yourself: what other technology in your IT stack was designed 20 years ago?
In this post, we’ll break down all the benefits of moving off of AD, and why it’s worth it to…