For communities in the U.S. to thrive, they need access to state and municipal government agencies and the essential services they provide. In order to carry out their work on-demand and at scale while mitigating security challenges such as nation-state cyber attacks, it’s critical that these agencies embrace modern identity. And that means…
In my previous blog, I introduced the concept of why hybrid, cloud-first, identity solutions are fundamentally different from those with an on-premises-first focus, providing you with a huge competitive advantage. Over the next few blog posts, I’ll be digging deeper into these differences, and detailing the advantages you’ll get by adopting Okta’s…
Welcome to our Founders in Focus series, where each month we highlight one of the founders of Okta Ventures’ portfolio companies. You’ll learn more about them and how they work with Okta. This month, we’re getting to know DataGrail, and their mission around privacy compliance.
What is DataGrail and what is your mission?
DataGrail aims to make…
Only a few companies can claim they’re working on solutions so cutting edge that they’re still uncovering new ways their product is useful. GitLab, a complete DevOps platform and lifecycle tool, is one of these companies.
What differentiates GitLab is its guiding philosophy: the company specializes in web-based, open-source code and DevOps…
Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements.
Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when…
Today, we’re excited to announce how Okta is working with CrowdStrike, Netskope, and Proofpoint to help organizations implement a modern, comprehensive, and integrated security strategy needed to protect today’s dynamic and remote working environments at scale.
The COVID-19 pandemic has ignited a sudden shift to remote work, driving an…
As they strive to meet the demands of today’s technical landscape, there’s a new challenge arising for the world’s largest organizations. These external demands can be summed up in 3 pressing imperatives that all enterprises must embrace:
Deliver on modernize IT initiatives
Create secure and seamless customer experiences
Adopt a zero-trust…
Every person who uses the Internet has a unique digital identity, consisting of individual data points, such as their username and passwords, what movies they stream, what articles they tweet, and more. Laws like the GDPR and CCPA attempt to give people some control over their data, but it can still be challenging to understand what our digital…
A one-time password or passcode (OTP) is a string of characters or numbers that authenticates a user for a single login attempt or transaction. An algorithm generates a unique value for each one-time password by factoring in contextual information, like time-based data or previous login events.
Tech support teams typically administer OTPs to…
A data breach happens when cybercriminals gain unauthorized access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…