Authentication

Tools for detecting and responding to potential threats post authentication

If a data breach happens at your organization,  you can’t afford to compromise on the speed and efficacy of your response. For the best possible defense against cybersecurity threats, security leaders need a comprehensive approach to Identity-powered security that supports risk mitigation in scenarios when would-be attackers have already exploited…

Tools for enforcing authentication policy

As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.  Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…

Tools for strengthening your Identity posture before authentication

Security leaders today need to adopt a comprehensive approach to Identity-powered cybersecurity that extends beyond multi-factor authentication (MFA) and single sign-on (SSO) to mitigate threats before, during, and after authentication-based attacks. This approach begins pre-authentication with a strong Identity posture capable of discovering…

Three ways Customer Identity supports data compliance and security

Website logins. Mobile apps. Customer support portals. Chat. Digitizing the user experience means most companies have vast amounts of data on their clients, collected across multiple channels and stored in different systems.  Depending on the jurisdiction, industry, or type of data, your organization must comply with many regulations governing…

What Is single sign-on (SSO)?

Single sign-on (SSO) is an authentication tool that enables users to securely access multiple applications and services using one set of credentials, eliminating the need to remember different passwords for each service. In today’s remote work ecosystem, where employees rely on software-as-a-service (SaaS) applications like Slack, Google Workspace…

Four best practices for adopting Okta Identity Engine

There’s never been a better time to upgrade to Okta Identity Engine (OIE). The self-service upgrade process has matured and helps ensure your org's upgrade will be successful. In fact, most upgrades take only a few minutes to complete. Already on OIE? Skip ahead to No. 3  “Leverage OIE” to learn how you can strengthen your security posture. Why…

Resilience redefined: Strengthening Identity availability

In the dynamic landscape of digital Identity management, organizations demand robust solutions that provide a seamless experience and continuity in the face of unforeseen disruptions. At Okta, we pride ourselves on providing “always-on” Identity services for millions of workers and consumers and offer a transparent view of the continuous strides…

How Development Teams Purchase SaaS

Earlier this year, Okta teamed with SD Times to create a report revealing  how organizations evaluate and purchase technology in 2023. Auth0 published the first edition of the report, How Development Teams Purchase SaaS, in October 2020. The report aimed to determine the extent of developers’ influence in shaping an organization's technology…

The real value of passwordless authentication

Earlier this year, Okta announced we’re going 100% passwordless, updating all of the apps and services our workforce uses to be consistent with phishing-resistant policies. Towards that goal, we're making great progress. Each week we analyze thousands of authentication events triggered by our workforce. And this past week, fewer than 2% of those…

Archive