ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Okta

  • Infographic: The Maturity Of Zero Trust In Europe.

    Zero Trust is driving European organizations to enhance their security. In an Okta poll, 93% of said organizations say they’ve implemented at least one security solution mapped to a zero-trust strategy. For more data on how your peers are adopting zero trust to protect their apps, download this infographic exhibiting European zero-trust trends.

  • How To Secure Your Vpn – And Then Rethink It Entirely

    For years, VPNs have allowed employees to securely access apps, databases and email systems outside of the corporate network. But as companies enable distributed work from everywhere, VPNs are being reconsidered. Download this infographic to learn how a 4-stage approach to zero-trust security can help you phase out your VPN.

  • Okta Video 10

    View this webcast to join a panel of Okta VPs as they discuss how European working practices have been affected across different countries. Also, learn how a secure, more dynamic way of working, which includes a zero-trust framework, can have a positive impact on employees by allowing them to work in the environment that best suits their needs.

  • Government 2020: Modernizing And Securing Remote Work

    Government agencies are scaling up telework to keep the public sector workforce productive, but what security challenges are plaguing them most? Download this infographic to understand the threats these agencies face and discover how a well-built access management strategy can help them handle these threats with confidence.

  • Okta Video 9

    Security professionals have had their hands full for about a year now. It’s important, then, to take time to reflect on what has changed in terms of access management. View this webcast featuring Okta VP & GM Jesper Frederiksen as he discusses his experiences immediately after locking down and how identity has evolved since that time.

  • Your IAM Strategy in a Post-Pandemic World

    Tune into the webinar, ‘Your IAM Strategy in a Post-Pandemic World’ where industry leaders discuss how to overcome the inevitable challenges around identity and access management as your staff becomes more mobile and your organization moves more services to the cloud.

  • API Access Management

    Inside this data sheet, learn how Okta API Access Management helps ensure a consistent security posture across your infrastructure.

  • Okta Video 3: Securing Complex On-Prem Apps With Okta

    Many organizations are running complex apps – such as Oracle E-Business Suite, SAP, PeopleSoft, and Oracle Hyperion – holding critical data that require modern protection. Access this webinar to learn how these complex apps should be protected, including best practices for a secure implementation and migrating off of legacy approaches.

  • Okta Report: Businesses at Work

    The applications that businesses access most have changed, and so too has the threat landscape for these apps. Download Okta’s Business at Work report, which takes an in-depth look into how organizations and people work today by exploring the applications and services they use and the resulting effect on threats and identity.

  • Okta Video 1: NetMotion + Okta Integration Webinar

    Okta’s Identity Cloud range of products are known for adaptive multi-factor authentication (MFA) and single sign-on (SSO). NetMotion’s mobile-centric platform, a VPN and a software-defined perimeter (SDP), is built on a zero-trust architecture. Watch this webinar to learn how they integrate to help you keep your remote workforce secure.

  • Can Your CIAM Solution Keep Up With The Market?

    Okta and Pulse surveyed 100 product and engineering leaders to understand how well their customer IAM solutions meet the needs of the evolving market. Access the infographic to view the results.

  • Silver Linings from 2020, for the Future of Work

    5 leading technology directors recently participated in the Okta-sponsored Hot Topics series: “Dynamic Work: Reimagining the Workplace”. Read on to see what they had to say about the future of IT security and remote working.

  • A New Approach to Automation & Identity Management

    Although it may be an unpopular opinion, automation – when configured effectively – has the potential to improve security, user experience and compliance operations. Watch this video to break down some common misconceptions and discover why automation should be a kay part of your identity management strategy.

  • The Role of CIAM in Digitally Transforming Customer Experiences

    Understand recent survey insights on the importance of digital transformation and IT as a strategic partner to achieving CX goals.

  • Integrate Enterprise Identities

    Learn how Okta Customer Identity products can help reduce the administrative overhead that comes with integrating enterprise identities.

  • Showdown: Okta vs. Active Directory

    You’re moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. Read on to learn how you can get both.

  • Showdown: Okta vs. Active Directory

    You’re moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. Read on to learn how you can get both.

  • Top 8 Identity And Access Management Challenges With Your Saas Applications

    There are 8 main identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, as well as best practices for addressing each of them. Tap into this white paper to uncover them.

  • 8 Identity and Access Management challenges

    There are 8 main identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, as well as best practices for addressing each of them. Tap into this white paper to uncover them.

  • Secure on-prem web apps with Okta

    In this webinar, see in real life how Okta – and Okta Access Gateway – can secure access to on-prem web apps.

  • Universal Directory: Create One World.

    Directories have helped businesses manage identities, but the more identities there are to manage, the more directories are born, and the more confusion arises. Dive into this e-book to learn more about directories, then discover a central identity management system by Okta that strives to integrate users across different organizations.

  • How Okta application integrations work

    In this product overview, discover how Okta uniquely enables SSO into any web or mobile application using open standards, or proprietary APIs, or Secure Web Authentication (SWA) and by SAML-enabling on-prem web applications.

  • WAM vs. OAG & SSO Comparison Guide

    Organizations are moving away from traditional Web Access Management (WAM) tools in favor of Single Sign-on (SSO) authentication protocols – but why the switch? This comparison guide aims to understand this trend by providing a comprehensive look at the costs and benefits associated with each method – read on to get started.

  • Rethinking Active Directory

    Back in its heyday, Microsoft Active Directory (AD) played a critical role in identity management programs. However, IT operations have shifted, and today’s workers demand flexibility and scalability that AD is unable to match. Read this white paper to learn more about rethinking AD and shifting the identity management paradigm.

  • Retiring Web Access Management (WAM)

    Many organizations have adopted web access management (WAM) solutions to secure access to web applications on-premises. But with the emergence of SaaS, mobile apps and IaaS, enabling access to all systems and users has broken the WAM security model. Take a look at this data sheet to learn how to modernize identity management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences