Back to Search Begin New Search Save Search Auto-Notify
Okta Demo Desk
Interested in learning more about Okta? Our team here at Carahsoft will help you understand how Okta helps secure connections between people and technology through their identity cloud. Join this quick, 30-minute demo to get all of your questions answered.
Add Favorite
Okta Webinar - Q&A with the University...
Higher Education Institutions face a daunting challenge to streamline, automate, and secure a complex IT ecosystem all while balancing user experience. In the quest to modernize infrastructure and services, the actual cost of managing legacy systems, homegrown solutions, and disparate vendors can have a significant impact. Join this interactive conversation with the University of Notre Dame's Identity and Access Management team to learn about...
Add Favorite
Preventing Digital Identity Theft and Fraud
As the public embraces technology in their everyday lives, they want great digital experiences with the government. Local and state agencies are rapidly modernizing, but the transformation arrives with new opportunities for identity theft and fraud. However, with the right approach, agencies can deliver digital services effectively while mitigating risks. Modern identity technology makes it possible. View this on-demand webinar to explore toda...
Add Favorite
Panel Webinar: Combatting Supply Chain...
With the increasing frequency and sophistication of supply chain attacks, it is critical for organizations to adopt a zero trust approach to their security strategy. This panel will bring together experts in endpoint, identity, and network security to discuss best practices for implementing zero trust in supply chain risk management. Panelists will explore the challenges and benefits of a zero trust model, share case studies of successful impl...
Add Favorite
Going Beyond Zero Trust Requirements
Zero Trust Architectures have become a focal point for the US Government in their efforts to improve the nation’s cybersecurity posture. Traditionally providing secure access to applications, including those hosted in the cloud, has forced agencies to make arduous compromises. They’ve needed to either sacrifice security for performance when bypassing security inspection, or performance for security by routing traffic through massiv...
Add Favorite
Department of Energy - Okta: Identity P...
Almost every organization has experienced a serious security breach or has felt the effects of a breach on another organization. To prevent breaches, Department of Energy labs often employ a variety of point solutions, but these aren’t comprehensive or simple to manage solutions. An identity based security strategy is the key to developing a Zero Trust Architecture (ZTA) that can help address DOE lab's security challenges. Join Okta in t...
Add Favorite
Google Workspace Okta Webinar
During this on-demand webinar, we discussed: How to empower your security team: Equip your team with seamless access to essential tools, all while safeguarding sensitive data. Enterprise Shield: Navigate compliance demands and combat cyber threats, ensuring you’re prepared for the challenges of today’s digital ecosystem. Streamlined Identity: Centralize management for streamlined IT operations and consistent user experience.
Add Favorite
Staying Ahead in the Evolving Landscape...
Attendees joined us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Attendees gained insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of TecMFA and Tectango for Police. They also discovered how these solutions streamline operations, improve data security, and contribute to CJIS compliance....
Add Favorite
The State of Secure Identity: The Lates...
The log-in box is both the gateway and guardian to your customer facing applications and a prime target for threat actors looking to profit from account takeovers. As these cybercriminals utilize AI to get past the log-in box, protecting your applications also requires sophisticated AI-based layered defenses. Okta’s State of Secure Identity Webinar gave attendees insight into this evolving threat landscape and how you can best defend you...
Add Favorite
Automate Critical IT and Security Tasks...
IT and security teams today must do more with less, all while facing rising security demands and pressures to innovate. Attendees joined on July 24th to learn how Okta Workflows can help teams keep up by automating Identity processes at scale - with pre-built templates that remove the need to write code. Attendees also learned about how implementing Okta Workflows can help your team accelerate time-to-market, improve security posture, and redu...
Add Favorite
Back to Search Begin New Search