Executive Resources

Trends for 2011: Botnets and Dynamic Malware

Source: Eset
Crimeware (malware related to computer crimes committed in order to gain financial profit) has proven its maturity by the increase in the number of malicious programs to which the term can be legitimately applied, as well as the increase in the proportion of this kind of malware to more traditional malicious code. This report reviews the main trends as regards malicious programs and antivirus security.

Related content:

The 2015 Forrester Wave™: B2E Cloud IAM

The Forrester Wave report identifies the six most significant solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy, and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.

The Eight Identity Management Challenges

With the exploding adoption of software-as-a-service (SaaS) applications, enterprise information technology (IT) is fundamentally changing. While on-demand services provide tremendous return on investment (ROI), they also introduce new challenges that must be overcome to truly capitalize on their potential.

Read this white paper to learn about the eight biggest identity and access management challenges associated with adopting and deploying cloud and SaaS applications, and best practices for addressing each of them.

Comparing Options for Office 365 Mobility Management

Enterprises are adopting Microsoft Office 365 in greater numbers. As part of deploying Office 365, information technology (IT) teams are re-evaluating how they secure mobile access to email and apps as the data moves into the cloud. This guide provides a comparison between the free solutions offered by Microsoft and Okta for mobility management of Office 365 apps and data. Read this eGuide to learn more about the differences between Microsoft MDM and Okta Mobility Management for Office 365.

Consumer Preference and Privacy Management: Gain a Competitive Edge by Empowering Your Customers

Brands that treat customers as individuals are gaining marketshare in today’s consumer-centric world. Enable customers to tell you how they want you to communicate with them, the products and services that interest them most, and how they want you to use—or not use—their information. The results will be trust and loyalty that lead to increased revenue for your brand.

To achieve this highly personalized level of engagement, brands need the ability to collect consumer choices at all touchpoints, and the capability to consistently apply these preferences to every customer interaction. This white paper explains how a consumer identity and access management (CIAM) platform supports brand-building customer experiences through preference and privacy management capabilities.

Tight Security Unlocks Customer Identity Data's Full Value

Identity data can be a tremendous asset for brands. Beyond contact and payment information, it chronicles the history of your interactions with each customer—data that can help you enrich your customers’ lives through convenience and relevance. But with high-profile data breaches frequently making headlines, no other asset holds as much potential to become a liability. Concerns about data security and consumer privacy can undermine your efforts to use data to engage with customers in personalized ways.