-
“With Okta, we can point to exactly how we secure specific data. Using Okta Identity Engine with Device Context, for example, we can enforce expected behaviors by restricting access to data if someone isn’t using a ManTech-managed machine registered in our unified endpoint manager. That level of granular control means …
-
“Protecting client data is a top priority to Welocalize, especially for those clients in highly regulated areas such as legal and financial services sectors. Even within one organization, there are requirements where users should not have access to other people’s projects. By implementing Okta authentication, clients have the ability and …
-
“As we grow and innovate, we are constantly looking to further integrate our products' functionalities in the most seamless and secure way. Implementing a centralized user identity is fundamental for how we build new features and solve problems for our users.”
-
"Okta was a game-changer for us. Having an authentication platform that you can easily integrate with greatly accelerates the underlying system you’re trying to build."
-
“Very little of what we did was invented at T-Mobile. We’ve been very fortunate to partner with a number of companies that made sure our transformation actually delivered on the promises of the technology.”
-
"Time-to-market was a security risk. The longer it took for us to onboard applications, the more people looked for alternate solutions. They created their own siloed credential stores, so we couldn’t monitor things or apply policies holistically.”
-
“Over a 36-hour period, we moved Workday, Office 365, Webex, ServiceNow, Salesforce, Check Point VPN, and Zoom to Okta.”
-
“It was a Whack-A-Mole game, from a security perspective. Each one of those separate IAM solutions was an opportunity to get the configuration wrong.”
-
"We have been able to deploy more than 120,000 users across 60 countries in less than six months. Our partnership with Okta was essential to get that done."
-
"Okta has been an amazing partner throughout this process, including answering a lot of questions, helping us get things accomplished, and providing good continuity as people have transitioned into this team. Okta’s knowledge transfer as we've moved through the process has been outstanding, too."
-
“We use Okta to decide who gets access to certain apps, data, or systems. With Okta, we know who is requesting access, and whether or not they're using a device we can trust.”
-
“Without a product like Okta, you really can’t achieve that Zero Trust model.”
-
“We’ve never had a server farm where we run Microsoft Active Directory or LDAP More and more, Okta is our directory for everything.”
-
“In our security department, we leave things better for end users than when we started. Any solution needs to make things easier. If it’s very hard or extremely complex, then we look for a better solution.”
-
“This decentralized model of support and service is key for us. On the central team, we have a lot to learn from our local colleagues, who face many different configurations, situations, constraints, and agendas.”