ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Okta

  • Phishing - resistant frictionless consumer experiences with passkeys

    81% of hacking-related breaches are caused by weak or stolen passwords. In this joint FIDO Alliance and Okta webinar, Okta’s Salman Ladha joins FIDO Alliance’s Megan Shamas to discuss the phishing-resistant security benefits of passkeys, as well as how they fuel superior customer experiences. Watch the webcast now to learn more.

  • Passkeys Primer

    Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.

  • AI at work

    This report reveals how executives view AI's impact on security, innovation, and efficiency. Key insights include executives' optimism about AI, concerns over data privacy and security risks, and priorities around improving security and boosting organizational efficiency. Read the full report to learn more.

  • Authentication After Passwords

    The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.

  • How Passkeys Work

    Passkeys are a new FIDO-based authentication standard that enables faster, easier, and more secure sign-up and sign-in experiences. This white paper explains how passkeys work, the technical flows involved, and implementation considerations for developers. Read the full white paper to learn more.

  • Mobilizing a Zero Trust Security Model

    As organizations move towards a distributed workforce, a Zero Trust security model is critical. Learn how SMBs are advancing their identity and access management maturity to secure remote access and build user trust. Read the full white paper to discover the key steps in your Zero Trust journey.

  • A Comprehensive Guide for Your Workforce Identity Maturity Journey

    Identity security was once simply a means of managing passwords and login credentials, but today, with identity at the heart of digital business, identity security is critical for protecting your organization. Download this white paper to unlock a comprehensive guide for your workforce identity maturity journey.

  • The CIO’s Guide to Identity-Driven Optimization

    For a 9-page guide to identity-driven optimization for CIOs, tap into this white paper that explores harnessing a universal control plane, balancing security and usability, and more.

  • Multi-Factor Authentication Deployment Guide

    Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.

  • The State of Zero Trust Security 2023

    As organizations prioritize Zero Trust, Identity is now seen as mission-critical for security strategy. This report examines how companies are implementing Zero Trust initiatives and leveraging Identity to protect their workforce and assets. Download the full report to learn more.

  • How To Protect Your Organization From Identity-Based Attacks

    According to a recent study, 86% of web app breaches involve the use of stolen credentials. The loss of a single high-ris access identity can render the rest of your security parameters completely futile. Download this white paper to learn what you need to look for in an effective identity security solution.

  • Anatomy Of Identity Based Attacks

    74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.

  • Why Okta for Identity

    Identity has always operated as the metaphorical front door to an organization. That means, when hackers leverage stolen credentials, initiating an attack is as simple as walking through the front door. Download this white paper more than 18,000 customers choose Okta for IAM.

  • Getting Started with Zero Trust Access Management

    For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.