okta-2022-logo

Anatomy of Identity Based Attacks

As a security practitioner, protecting your organization’s data is your number one priority. Yet with the explosion of the mobile and hybrid workforce, SaaS adoption, and...

Two-Factor Authentication Evaluation Guide

In this guide, you will learn how to evaluate a solution based on: Security Impact – Does the solution reduce risks, and can it provide visibility into your environment? Strategic...

Consumerization of IT – Pulse Data

To meaningfully track the trends impacting IT teams today and measure whether they’re keeping the workforce protected and productive, Pulse and Okta surveyed 500 IT, security,...

CIAM For Dummies

You’ve no doubt used customer identity and access management (CIAM) in your personal life as a customer of other businesses — whether you realized it or not. Perhaps...
1 2 3