Phishing - resistant frictionless consumer experiences with passkeys
WEBCAST:
81% of hacking-related breaches are caused by weak or stolen passwords. In this joint FIDO Alliance and Okta webinar, Okta’s Salman Ladha joins FIDO Alliance’s Megan Shamas to discuss the phishing-resistant security benefits of passkeys, as well as how they fuel superior customer experiences. Watch the webcast now to learn more.
Posted: 12 Jul 2024 | Premiered: Jul 13, 2024
|
|
Passkeys Primer
WHITE PAPER:
Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
Authentication After Passwords
EBOOK:
The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
AI at work
RESEARCH CONTENT:
This report reveals how executives view AI's impact on security, innovation, and efficiency. Key insights include executives' optimism about AI, concerns over data privacy and security risks, and priorities around improving security and boosting organizational efficiency. Read the full report to learn more.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
Mobilizing a Zero Trust Security Model
WHITE PAPER:
As organizations move towards a distributed workforce, a Zero Trust security model is critical. Learn how SMBs are advancing their identity and access management maturity to secure remote access and build user trust. Read the full white paper to discover the key steps in your Zero Trust journey.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
How Passkeys Work
WHITE PAPER:
Passkeys are a new FIDO-based authentication standard that enables faster, easier, and more secure sign-up and sign-in experiences. This white paper explains how passkeys work, the technical flows involved, and implementation considerations for developers. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
A Comprehensive Guide for Your Workforce Identity Maturity Journey
WHITE PAPER:
Identity security was once simply a means of managing passwords and login credentials, but today, with identity at the heart of digital business, identity security is critical for protecting your organization. Download this white paper to unlock a comprehensive guide for your workforce identity maturity journey.
Posted: 23 Apr 2024 | Published: 23 Apr 2024
|
|
The CIO’s Guide to Identity-Driven Optimization
WHITE PAPER:
For a 9-page guide to identity-driven optimization for CIOs, tap into this white paper that explores harnessing a universal control plane, balancing security and usability, and more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024
|
|
Multi-Factor Authentication Deployment Guide
WHITE PAPER:
Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024
|
|
The State of Zero Trust Security 2023
RESEARCH CONTENT:
In partnership with Qualtrics, Okta conducted a global study with the help of 860 information security decisionmakers across a range of industry verticals. In the 38 pages of this report, Okta has condensed the findings of this research so that you can extract the most valuable and relevant information. Read on to learn more.
Posted: 18 Apr 2024 | Published: 18 Apr 2024
|
|
How To Protect Your Organization From Identity-Based Attacks
WHITE PAPER:
According to a recent study, 86% of web app breaches involve the use of stolen credentials. The loss of a single high-ris access identity can render the rest of your security parameters completely futile. Download this white paper to learn what you need to look for in an effective identity security solution.
Posted: 17 Apr 2024 | Published: 17 Apr 2024
|
|
Anatomy Of Identity Based Attacks
WHITE PAPER:
74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
Posted: 12 Apr 2024 | Published: 13 Apr 2024
|
|
Why Okta for Identity
WHITE PAPER:
Identity has always operated as the metaphorical front door to an organization. That means, when hackers leverage stolen credentials, initiating an attack is as simple as walking through the front door. Download this white paper more than 18,000 customers choose Okta for IAM.
Posted: 11 Apr 2024 | Published: 12 Apr 2024
|
|
Getting Started with Zero Trust Access Management
EBOOK:
For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.
Posted: 14 Sep 2022 | Published: 14 Sep 2022
|
|
Business at Work
EBOOK:
It's been quite a year for the workplace. AI became a mainstream tool with the rise of ChatGPT. Automation eased some routine work. Organizations took all of this into account as they selected new tools to stay competitive and minimize risk. Download this eGuide and learn which apps and tools are succeeding and thriving (and why).
Posted: 03 Jun 2024 | Published: 03 Jun 2024
|
|
CIAM vs. IAM—Why the Difference Matters
EGUIDE:
Take a look through this E-Guide to discover what makes Identity and Access Management (IAM) different from Customer Identity and Access Management (CIAM).
Posted: 22 Jun 2023 | Published: 21 Jun 2023
|
|
Decoding Customer IAM (CIAM) vs. IAM
WHITE PAPER:
Access this paper to learn about Customer IAM and how it is similar to IAM and learn the key ways they are different from each other. Find out which could be the right choice for your organization.
Posted: 27 May 2021 | Published: 27 May 2021
|
|
Build vs. Buy: Key considerations and the advantages of a pre-built identity solution
WHITE PAPER:
Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services. This paper will help you decide which solution is right for you.
Posted: 06 Oct 2020 | Published: 06 Oct 2020
|
|
Transforming customer experiences
WHITE PAPER:
Learn how a modern customer identity and access management (CIAM) solution can be a big part of your organization's digital transformation of its users customer experience while staying secure.
Posted: 06 Oct 2020 | Published: 06 Oct 2020
|
|
Bring Secure, Frictionless Customer Experiences to Market Faster with Modern CIAM
WHITE PAPER:
Learn how a modern customer identity and access management (CIAM) can reduce development time of digital experiences and eliminate potential security gaps by putting the customer's identity front and center.
Posted: 02 Jul 2020 | Published: 02 Jul 2020
|
|
The new workplace. Re-imagining work after 2020.
WHITE PAPER:
For this report, 6,000 office workers across the UK, Germany, France and the Netherlands were surveyed. The questions revolved around their readiness to work from home, their employers’ remote security, and the change in culture that comes with working remotely.Read on to see how their perceptions compare to your own.
Posted: 25 Jun 2020 | Published: 25 Jun 2020
|
|
Unlocking Omni-channel With Unified Customer Identity
WHITE PAPER:
To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Read this paper to learn more about this approach?
Posted: 25 Jun 2020 | Published: 25 Jun 2020
|
|
Identity and Access Management Tools to Look Out For
ESSENTIAL GUIDE:
Technologies such as artificial intelligence, machine learning, microservices and cloud computing are making their way into IAM tools – all with the goal of making them more seamless, accessible and automated for both end users and IT. So, what does the future hold for IAM? Tap into this essential guide to find out.
Posted: 05 Apr 2019 | Published: 01 Apr 2019
|
|
Okta Active Directory Integration - An Architecture Overview
WHITE PAPER:
This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013
|