Okta’s passion for the democratic process starts at the top, with our CEO Todd McKinnon, who understands that every identity and voice must be represented in the voting process. As an organization, Okta has taken steps to make voting easier by rolling out a vote.gov app—connecting employees and customers to a public website to help find voter…
If you’ve checked out Dogfooding Chronicles past, you’ll know we’re all about efficiency. We've explained how to use automation to manage app access through tools like Workday (as a source), and Okta features like Group Rules and Group Push. In this post, I’d like to focus on one of Okta’s newest products we’ve been dogfooding, that boosts…
For organizations and government agencies alike, strong identity management is paramount. Millions of people share sensitive, personal information with commercial and public bodies every day, so companies and public sector agencies have a responsibility to secure their assets.
This is where ICAM and FICAM come in.
What is ICAM?
Identity,…
Yesterday, implementing Zero Trust security was important—today, it’s an imperative. Tomorrow, organizations that still haven’t rethought their security strategies could be left in the dust. But there’s still a chance to get ahead without investing in all the infrastructure you need at once; once you start the journey, it’s easy to continuously…
This is the third and final blog post in our Adapt to the Cloud Operating Model series.
With any organizational change that impacts people, process, and technology, it’s best to take it in stride. When talking with customers about their Zero Trust security initiatives, an analogy I often use is: “if Google’s BeyondCorp is the peak of Mt. Everest,…
SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…
It’s no secret that customer behavior is constantly evolving. But the changes we’ve seen in the last seven months and the acceleration of customers adopting digital-first experiences for nearly every aspect of their life is unprecedented. And this trend is only going to continue, creating a need for customers to navigate digital touchpoints in a…
Viruses, spyware, and other malware can affect more than just desktop computers and laptops. Mobile devices are vulnerable as well. As the threat landscape continues to evolve, it’s important that we not only understand these risks—but how we can protect ourselves against them.
In this post, we’ll take a closer look at the mobile phone security…
Zero Trust is a security framework based on the belief that every user, device, and IP address accessing a resource is a threat until proven otherwise. Under the concept of “never trust, always verify,” it requires that security teams implement strict access controls and verify anything that tries to connect to an enterprise’s network.
Coined in…
Identity governance and administration (IGA) is a policy-based approach to identity management and access control. As the name implies, IGA systems merge identity governance and identity administration to provide additional functionality beyond traditional identity and access management (IAM) tools. Particularly, they offer valuable support in…