Executive Resources

Hanging on the Telephone: Antivirus Cold-calling Support Scams

Source: Eset
Service support scammers rely on the naiveté of their victims in order to persuade them to grant access to their computers and credit card details. There’s very little a security company can do directly to prevent this activity, apart from keeping its own software up to date so as to detect malware and block as many threats as possible. Read this white paper to find out about different types of scams that threaten your data security.

Related content:

The 2015 Forrester Wave™: B2E Cloud IAM

The Forrester Wave report identifies the six most significant solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy, and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.

The Eight Identity Management Challenges

With the exploding adoption of software-as-a-service (SaaS) applications, enterprise information technology (IT) is fundamentally changing. While on-demand services provide tremendous return on investment (ROI), they also introduce new challenges that must be overcome to truly capitalize on their potential.

Read this white paper to learn about the eight biggest identity and access management challenges associated with adopting and deploying cloud and SaaS applications, and best practices for addressing each of them.

Comparing Options for Office 365 Mobility Management

Enterprises are adopting Microsoft Office 365 in greater numbers. As part of deploying Office 365, information technology (IT) teams are re-evaluating how they secure mobile access to email and apps as the data moves into the cloud. This guide provides a comparison between the free solutions offered by Microsoft and Okta for mobility management of Office 365 apps and data. Read this eGuide to learn more about the differences between Microsoft MDM and Okta Mobility Management for Office 365.

Consumer Preference and Privacy Management: Gain a Competitive Edge by Empowering Your Customers

Brands that treat customers as individuals are gaining marketshare in today’s consumer-centric world. Enable customers to tell you how they want you to communicate with them, the products and services that interest them most, and how they want you to use—or not use—their information. The results will be trust and loyalty that lead to increased revenue for your brand.

To achieve this highly personalized level of engagement, brands need the ability to collect consumer choices at all touchpoints, and the capability to consistently apply these preferences to every customer interaction. This white paper explains how a consumer identity and access management (CIAM) platform supports brand-building customer experiences through preference and privacy management capabilities.

Tight Security Unlocks Customer Identity Data's Full Value

Identity data can be a tremendous asset for brands. Beyond contact and payment information, it chronicles the history of your interactions with each customer—data that can help you enrich your customers’ lives through convenience and relevance. But with high-profile data breaches frequently making headlines, no other asset holds as much potential to become a liability. Concerns about data security and consumer privacy can undermine your efforts to use data to engage with customers in personalized ways.