Overview
Explore
Expertise
Ecosystem
What's new
Identity and Access Management
Okta Essentials
Okta is one of the leaders in Identity Providers (IdP) and simplifies how users connect to applications and resources. It uses tools such as Single Sign-on (SSO), Multifactor authentication (MFA), passwordless authentication with Okta FastPass, workflows, and more.
Learning Path
Identity and Access Management
Okta Foundations
This on-demand integration lab is a capability of WWT's Advanced Technology Center (ATC), designed to provide hands-on experience with Okta.
The purpose of this lab is to help you develop proficiency in navigating and configuring features within the Okta admin console. In this lab environment, you will gain hands-on experience with essential Okta tasks, including managing users and groups, integrating applications using SAML, and connecting Okta with Active Directory. You will also explore how to configure device assurance policies, ensuring secure access across various devices.
Foundations Lab
• 63 launches
Security Operations
CrowdStrike and Zscaler Private Access Integrated Lab
WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
• 207 launches
Endpoint Security
Zscaler Internet Access, CrowdStrike, and Okta Integration Lab
This lab exists to provide hands-on experience with the integration between ZIA, CrowdStrike Falcon, and Okta through relevant use cases. First, this lab can be used to see how the integration between CrowdStrike Falcon and ZIA can ensure administrators have end-to-end insight into the threat landscape to minimize attack surface and deliver rapid threat detection and response. On top of this, the lab allows users to see how Okta can integrate with both CrowdStrike and Zscaler to strengthen a company's Zero Trust profile, enhance threat detection during authentication and monitor the intersection of security and access management.
Advanced Configuration Lab
• 135 launches
Zero Trust
Partner POV | How Okta, CrowdStrike, and Zscaler deliver end-to-end Zero Trust
This partnership addresses challenges like digital transformation, distributed workforces, and resource constraints by leveraging AI and specialized expertise to improve security outcomes.
Partner Contribution
• Aug 21, 2024
Identity and Access Management
Partner POV | AI at Work 2024: A view from the C-suite
C-suite executives must prioritize the adoption of robust security practices around AI, with IAM at the forefront, to safeguard against unauthorized access and potential breaches.
Partner Contribution
• Aug 14, 2024
Security Operations
CrowdStrike Proving Ground Lab
WWT's ATC CrowdStrike Proving Ground Lab exists to showcase the CrowdStrike Falcon platform's web UI and ability to alert on, and prevent, breaches using cloud data and machine learning.
Advanced Configuration Lab
• 1324 launches
Identity and Access Management
Beyond Identity Foundations Lab
This lab features Beyond Identity which is an authentication solution that uses device-bound credentials for zero-friction passwordless authentication. Beyond Identity is a cloud-native platform that uses Authenticators downloaded on endpoints which registers a users credentials and collects signals on the endpoint to capture device security posture for authentication.
Foundations Lab
• 172 launches
Identity and Access Management
Identity and Access Management Briefing
Join our exclusive 45-minute briefing on Identity and Access Management (IAM), tailored for senior security and business leaders seeking to enhance their organization's IAM capabilities. Gain valuable insights and strategies to effectively address the three greatest challenges encountered in the IAM space.
Briefing
Identity and Access Management
Defending Healthcare Against Cyber Attacks
It's true that all businesses are at risk for cyber attack. However, few industries face the level of threat aimed at healthcare.
Article
• Jun 3, 2023
Zero Trust
Zero Trust Briefing
Increased visibility, reducing the attack surface, and rationalizing zero trust theory with technical implementation—these are just a few of the outcomes that a successful zero trust program should provide. Securing the enterprise, both on-premise and in the cloud, is a challenge in today's landscape.
Briefing
Identity and Access Management
Identity and Access Management Workshop
As identities span across internal, external, customer or a combination of the three, how are you managing them? What is your confidence level that you know who that identity belongs to? With the trend of "identity is the new perimeter," it is extremely vital that organizations have an IAM strategy and know how IAM can enable a business while strengthening their security posture.
Workshop