Okta Adds Privileged Access And Identity Governance

Share post:

Identity and access management company, Okta recently announced plans to expand its platform to two key areas: privileged access and identity management. The company is known for its identity access management product, which allows companies the ability to sign on to multiple cloud products with a single sign-on. While the first area, privileged access, gives businesses the ability to provide access to a limited number of people and key administrative services within an organization on demand, the governance area provides a way for security teams to conduct detailed reports and search for identity-related issues.

Some key features of privileged access include the ability to restrict access to a specific time slot and record a video of the session so that there is a trace of exactly what happened while someone was accessing the system. For Octa CEO Todd McKinnon, these features provide additional levels of protection for these sensitive accounts. Looking at the other area, the governance piece provides a way for security teams to perform detailed reports and search for identity issues. While both products were recently announced at the company’s virtual octane customer conference, they will not be available until the first quarter of the following year.

For more information, read the <a href=”_wp_link_placeholder” data-wplink-edit=”true”>original story</a> in Tech Crunch

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday, Feb. 23, 2024

This episode features discussion on the takedown of the LockBit ransomware gang

Breaking news: RCMP facing ‘alarming’ cyber attack

The RCMP is facing a serious cyber attack from an unspecified threat actor. The Mounties told CBC News today that a “breach of this magnitude is alarming.” “The situation is evolving quickly but at this time, there is no impact on RCMP operations and no known threat to the safety and security of Canadians,” a spokesperson

Leaked documents may show the inside of China’s hacking strategy

Documents apparently stolen by disgruntled employees to embarrass their firm may give insight into China's cyber

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways