ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Okta

  • Phishing - resistant frictionless consumer experiences with passkeys

    81% of hacking-related breaches are caused by weak or stolen passwords. In this joint FIDO Alliance and Okta webinar, Okta’s Salman Ladha joins FIDO Alliance’s Megan Shamas to discuss the phishing-resistant security benefits of passkeys, as well as how they fuel superior customer experiences. Watch the webcast now to learn more.

  • Passkeys Primer

    Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.

  • AI at work

    This report reveals how executives view AI's impact on security, innovation, and efficiency. Key insights include executives' optimism about AI, concerns over data privacy and security risks, and priorities around improving security and boosting organizational efficiency. Read the full report to learn more.

  • Authentication After Passwords

    The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.

  • How Passkeys Work

    Passkeys are a new FIDO-based authentication standard that enables faster, easier, and more secure sign-up and sign-in experiences. This white paper explains how passkeys work, the technical flows involved, and implementation considerations for developers. Read the full white paper to learn more.

  • Mobilizing a Zero Trust Security Model

    As organizations move towards a distributed workforce, a Zero Trust security model is critical. Learn how SMBs are advancing their identity and access management maturity to secure remote access and build user trust. Read the full white paper to discover the key steps in your Zero Trust journey.

  • How Workforce Identity Can Power Security

    Identity is the only technology integrated across your entire IT and security stack, from devices and on-prem applications to cloud apps and workloads. Download this eGuide and learn how an Identity-powered approach to security protects your workers, resources, and their innovation and productivity.

  • Business at Work

    It's been quite a year for the workplace. AI became a mainstream tool with the rise of ChatGPT. Automation eased some routine work. Organizations took all of this into account as they selected new tools to stay competitive and minimize risk. Download this eGuide and learn which apps and tools are succeeding and thriving (and why).

  • Multi-Factor Authentication Deployment Guide

    Multi-factor authentication has become a global best practice for application developers to secure access to their applications. Download this eGuide and learn how a modern, automated approach to MFA can help organizations control access, safely automate recovery, and dramatically reduce the risk of data breaches.

  • A Comprehensive Guide for Your Workforce Identity Maturity Journey

    Identity security was once simply a means of managing passwords and login credentials, but today, with identity at the heart of digital business, identity security is critical for protecting your organization. Download this white paper to unlock a comprehensive guide for your workforce identity maturity journey.

  • The CIO’s Guide to Identity-Driven Optimization

    For a 9-page guide to identity-driven optimization for CIOs, tap into this white paper that explores harnessing a universal control plane, balancing security and usability, and more.

  • Multi-Factor Authentication Deployment Guide

    Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.

  • The State of Zero Trust Security 2023

    In partnership with Qualtrics, Okta conducted a global study with the help of 860 information security decisionmakers across a range of industry verticals. In the 38 pages of this report, Okta has condensed the findings of this research so that you can extract the most valuable and relevant information. Read on to learn more.

  • How To Protect Your Organization From Identity-Based Attacks

    According to a recent study, 86% of web app breaches involve the use of stolen credentials. The loss of a single high-ris access identity can render the rest of your security parameters completely futile. Download this white paper to learn what you need to look for in an effective identity security solution.

  • Anatomy Of Identity Based Attacks

    74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.

  • Why Okta for Identity

    Identity has always operated as the metaphorical front door to an organization. That means, when hackers leverage stolen credentials, initiating an attack is as simple as walking through the front door. Download this white paper more than 18,000 customers choose Okta for IAM.

  • Report: Modern CIAM as a growth catalyst

    Identity is fundamental to how businesses operate in today’s world, with customer identity and access management (CIAM) playing a critical role in the customer relationship cycle. Through this white paper, Okta will show you how customer and employee growth correlate to an organization’s Identity needs. Read on to learn more.

  • Leveraging Public and Community Identity for Stronger CX

    In an attempt to better accommodate customer needs, government entities continue to migrate services online. But what roles does security play in the success of these initiatives? Tune into this webcast to see what experts have to say.

  • How passkeys work: A technical primer on passkeys

    Passwords have long been a thorn in the side for organizations, posing difficulties for both customer experience and security. Passkeys, an evolution of FIDO2 authentication, present organizations with a phishing-resistant alternative to passwords that also improve the user experience. Read on to learn more.

  • Passkeys primer

    Synced passkeys represent a move forward in phishing-resistant web authentication, but some of the same aspects that contribute to strong authentication security have limited their mainstream adoption. Download this white paper to learn more about the unique benefits of synced passkeys.

  • Authentication after passwords

    But as friction arises between differing needs, many security teams tasked with securing identities are turning to passwordless as the answer. Download this e-book to learn more about the many misconceptions of passwordless authentication and see if it presents the right option for your organization.

  • Evolve your Authorization Strategy with Fine Grained Authorization

    Traditional methods for securing and managing access—like first generation point solutions and in-application DIY coding—simply aren’t flexible or scalable enough. Today’s apps need more precise access control. Introducing Fine-Grained Authorization (FGA). Read this paper to procure the FGA essentials.

  • Delivering public benefits and services at scale with Okta’s integration with Login.gov

    While a stark contrast exists between the digital services provided by the 2 types of enterprise, expectations to deliver top customer experiences are being absorbed from the commercial digital world into the public sector. Download the white paper to learn how Okta’s vendor-neutral Identity solution can help government.

  • Welcome to a New Era of Digital Government

    Every online interaction, no matter how big or small, begins with an identity.In order to best serve the public, governments need to make sure every one of their digital experiences is centered around a human. Watch this video to learn more.

  • Okta Solutions for the Next Gen of Fraud Prevention

    An effective Identity strategy reduces the lingering threat of fraud, preparing government agencies for potential emergencies. This data sheet walks through the foundation of a secure Identity solution, spelling out the 3 most foundational steps. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.