All Research Sponsored By:Okta

Phishing - resistant frictionless consumer experiences with passkeys
WEBCAST: 81% of hacking-related breaches are caused by weak or stolen passwords. In this joint FIDO Alliance and Okta webinar, Okta’s Salman Ladha joins FIDO Alliance’s Megan Shamas to discuss the phishing-resistant security benefits of passkeys, as well as how they fuel superior customer experiences. Watch the webcast now to learn more.
Posted: 12 Jul 2024 | Premiered: Jul 13, 2024

TOPICS:  .NET

Passkeys Primer
WHITE PAPER: Synced passkeys are a significant step towards a passwordless world, offering increased security and convenience over traditional passwords. Learn how passkeys work and explore different implementation approaches in this comprehensive white paper.
Posted: 10 Jul 2024 | Published: 11 Jul 2024


AI at work
RESEARCH CONTENT: This report reveals how executives view AI's impact on security, innovation, and efficiency. Key insights include executives' optimism about AI, concerns over data privacy and security risks, and priorities around improving security and boosting organizational efficiency. Read the full report to learn more.
Posted: 10 Jul 2024 | Published: 11 Jul 2024


Authentication After Passwords
EBOOK: The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.
Posted: 10 Jul 2024 | Published: 11 Jul 2024


Mobilizing a Zero Trust Security Model
WHITE PAPER: As organizations move towards a distributed workforce, a Zero Trust security model is critical. Learn how SMBs are advancing their identity and access management maturity to secure remote access and build user trust. Read the full white paper to discover the key steps in your Zero Trust journey.
Posted: 10 Jul 2024 | Published: 11 Jul 2024


How Passkeys Work
WHITE PAPER: Passkeys are a new FIDO-based authentication standard that enables faster, easier, and more secure sign-up and sign-in experiences. This white paper explains how passkeys work, the technical flows involved, and implementation considerations for developers. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 11 Jul 2024


A Comprehensive Guide for Your Workforce Identity Maturity Journey
WHITE PAPER: Identity security was once simply a means of managing passwords and login credentials, but today, with identity at the heart of digital business, identity security is critical for protecting your organization. Download this white paper to unlock a comprehensive guide for your workforce identity maturity journey.
Posted: 23 Apr 2024 | Published: 23 Apr 2024

TOPICS:  .NET

The CIO’s Guide to Identity-Driven Optimization
WHITE PAPER: For a 9-page guide to identity-driven optimization for CIOs, tap into this white paper that explores harnessing a universal control plane, balancing security and usability, and more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET

Multi-Factor Authentication Deployment Guide
WHITE PAPER: Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET

The State of Zero Trust Security 2023
RESEARCH CONTENT: As organizations prioritize Zero Trust, Identity is now seen as mission-critical for security strategy. This report examines how companies are implementing Zero Trust initiatives and leveraging Identity to protect their workforce and assets. Download the full report to learn more.
Posted: 18 Apr 2024 | Published: 18 Apr 2024

TOPICS:  .NET

How To Protect Your Organization From Identity-Based Attacks
WHITE PAPER: According to a recent study, 86% of web app breaches involve the use of stolen credentials. The loss of a single high-ris access identity can render the rest of your security parameters completely futile. Download this white paper to learn what you need to look for in an effective identity security solution.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  .NET

Anatomy Of Identity Based Attacks
WHITE PAPER: 74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
Posted: 12 Apr 2024 | Published: 13 Apr 2024

TOPICS:  .NET

Why Okta for Identity
WHITE PAPER: Identity has always operated as the metaphorical front door to an organization. That means, when hackers leverage stolen credentials, initiating an attack is as simple as walking through the front door. Download this white paper more than 18,000 customers choose Okta for IAM.
Posted: 11 Apr 2024 | Published: 12 Apr 2024

TOPICS:  .NET

Getting Started with Zero Trust Access Management
EBOOK: For businesses adopting a Zero Trust security posture, placing identity at the posture’s foundation can assure continuous access assessment without friction for users. Explore this e-book to learn the 4 stages that comprise Okta’s model for enabling identity-centric Zero Trust.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TOPICS:  .NET