ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Okta

  • Eileen Jennings-Brown Podcast

    The future of work is again a business-critical question. COVID-19 has been a pivotal event in reshaping not just where we work, how we work or who we work with, but what works.

  • The Future of Work: Okta Podcast

    Listen to the first episode of The Future of Work Series, in partnership with Okta, with Guy Mason, Bourne Leisure Group’s CIO, in conversation with Editor Peter Stojanovic as they discuss how to adjust to a remote work lifestyle.

  • How Okta’s cloud-first IT strategy enables a dynamic work environment

    The advancement of the cloud stems from the increased flexibility, scalability and reduced cost that come with moving critical business systems to it. Cloud is most relevant in an age where employees are working from home. Network security is moving to the cloud, and in this webcast, Okta, a company with no data centers, explain why.

  • Hot Topic Live: Eileen Jennings-Brown

    COVID-19 has been a pivotal event in reshaping not just where we work, how we work or who we work with, but what works. In this Future of Work episode, Eileen Jennings-Brown discusses how her organization, Wellcome Trust, prepared for remote working and how her team is preparing for further disruption in the future.

  • How to Implement Zero Trust Security in Europe

    Zero Trust has come a long way since its inception in 2009, but many still have questions. What should Zero Trust look like? How does it affect workloads, networks, people and devices within an organization? How can I begin to implement my own Zero-Trust model? Watch this webcast for answers to these questions and more from Forrester & Okta.

  • The New Workplace: Re-Imagining Work After 2020

    For this report, 6,000 office workers across the UK, Germany, France and the Netherlands were surveyed. The questions revolved around their readiness to work from home, their employers’ remote security, and the change in culture that comes with working remotely. Read on to see how their perceptions compare to your own.

  • The State of Zero Trust Security in Global Organisations

    If your organisation is looking to implement a zero-trust security model to one or more parts of your network, then this Okta report is a must-read.Zero trust is beginning to take shape across the globe, and this report reveals details as to where it is being implemented, the industries that are implementing it, and how to build a zero-trust stack.

  • 5 Identity Attacks that Exploit Your Broken Authentication

    Compromised credentials are the leading cause of data beaches. These credentials can be compromised through a number of attacks, including phishing, credential stuffing and password spraying. In this infographic, learn how your organization can defend against data breaches with strong authentication.

  • The Maturity of Zero Trust in Europe

    While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.

  • Businesses at Work (from Home) 2020 Edition

    Organization around the world have reacted to the pandemic quickly, rolling out remote communication apps, extending VPNs, and adding MFA to ensure the productivity, connectivity, and security of their (now) remote workforces. In this report, 2020 Business at Work (from Home), take a closer look at the fastest growing apps and tools.

  • Identity as a Service for Dummies

    According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.

  • 5 Arguments to Justify Your Identity Spend

    When it comes to identity spend, there’s often a communication gap between the value of security infrastructure and key business initiatives. Discover 5 key business drivers, and how identity feeds into them, to help you make a stronger case for increased identity spending organization-wide.

  • Forrester Report: A Practical Guide to a Zero-Trust Implementation

    Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don’t know how to implement it, or they feel daunted by the shifts in strategy and architecture that Zero Trust demands. Read this Forrester report to learn the building blocks of a successful Zero-Trust implementation roadmap.

  • Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations

    For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.

  • Rethinking API Security

    APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.

  • Unlocking Omni-Channel with Unified Customer Identity

    To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.

  • Reference Huddle: How Pitney Bowes Solves Business Challenges with Okta

    In this group reference call, Okta speaks with Kenn Bryant, Director of Architecture and SaaS Services at Pitney Bowes, about how they use Okta's APIs to deliver an unmatched customer experience, enable the company to leverage the cloud, and make critical business data more accessible to customers, employees, and partners.

  • Bring Secure, Frictionless Customer Experiences to Market Faster with Modern CIAM

    To meet the security and privacy expectations of today’s customers, organizations need to put their customers’ identity front and center. A customer identity and access management (CIAM) solution can do just that. Learn how Okta Identity Cloud can help you address your IAM and CIAM concerns today and in the future.

  • Bridging the Gap Between Active Directory and the Cloud

    In this white paper, learn how you can integrate your legacy AD environment with modern SSO from Okta and the Okta Identity Cloud.

  • 7 Steps to SSO + MFA to On-Prem Apps

    Learn how to use Okta Access Gateway to control access to Hybrid IT and on-prem web applications, all without changing how your on-prem web apps work today.

  • Secure Access to On-prem Apps & Hybrid Cloud Security

    In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.

  • CA SiteMinder Migration Guide

    To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.

  • Passwordless Authentication with Okta

    In this demo video, learn how to setup Passwordless Authentication with Okta for your organization using adaptive policies.

  • Okta + Proofpoint: Phishing Security and Response

    For more than 80% of breaches caused by compromised credentials; attackers don’t need to hack in – they can just log in. So how can organizations protect against attacks like phishing? Learn more in this webinar.

  • Okta + MuleSoft: Comprehensive API Access Control and Management

    As the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.