Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

Our Website:

Webcast: Zero Trust in Practice

by OktaApr 18, 2019

Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start?

Webcast: Want Security in the Cloud? Look to Identity First

by OktaSep 27, 2018

Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations.

Research Report: Forrester Report Brief: Reframe The Business Case for Identity and Access Management in Security Terms

by OktaMar 09, 2016

For security and risk (S&R) professionals, identity and access management (IAM) has become crucial to improving the company's overall security posture. However, to gain budget and increased control for a function not always under their direct control, S&R pros will have to reframe the business case for IAM in security terms and make a direct connection to the CIO's top technology initiatives.

This Forrester report presents the most important security benefits of IAM in its component areas -- access management and identity management -- to help S&R professionals build a solid case for implementing IAM.