Two-Factor Authentication Evaluation Guide

In this guide, you will learn how to evaluate a solution based on: Security Impact – Does the solution reduce risks, and can it provide visibility into your environment? Strategic...

Two-Factor Authentication Evaluation Guide

In this guide, you will learn how to evaluate a solution based on: Security Impact – Does the solution reduce risks, and can it provide visibility into your environment? Strategic...

Passwordless: The Future of Authentication

In this white paper, you’ll learn: How digital transformation is prompting a shift toward passwordless authentication The problem with passwords as a form of authentication The...
Logo Okta 051222

Consumerization of IT – Pulse Data

To meaningfully track the trends impacting IT teams today and measure whether they’re keeping the workforce protected and productive, Pulse and Okta surveyed 500 IT, security,...
Logo Okta 051222

Busting Myths About SSO

In today’s identity management climate, single sign-on (SSO) capability is critical to the success of enterprise identity and access management (IAM). IT departments face...
Logo Okta 051222

CIAM For Dummies

You’ve no doubt used customer identity and access management (CIAM) in your personal life as a customer of other businesses — whether you realized it or not. Perhaps...
1 2 3