White Papers & Webcasts Archive
White Papers & Webcasts
Watch this webinar on-demand featuring PwC and Okta, where we will delve into the success story of how a Customer Identity Cloud (CIC) playbook at Wyndham was implemented,
Read More
White Papers & Webcasts
Winning loyalty programs ensure that only legitimate customers are able to access their loyalty accounts and that those accounts are easily accessible and reflect their preferences and behaviors.
Read More
White Papers & Webcasts
As we’ve seen threats to password security increase in recent years, multi-factor authentication (MFA) has gained rapid adoption. For consumer and enterprise web and mobile applications, it’s become
Read More
White Papers & Webcasts
Discover how Customer Identity and Access Management (CIAM) can enhance your security. Learn to battle bots, fake signups, and stolen credentials while streamlining authentication and authorization. Key Takeaways:•
Read More
White Papers & Webcasts
How well are marketers really leveraging their customer data? Okta recently conducted a research study surveying 426 marketing professionals in the U.S. with the goal of answering this
Read More
White Papers & Webcasts
Join Okta CMO Kerry Ok + AMA to learn about the top data challenges impacting marketing teams and strategies to overcome these. Based on research findings from 400+
Read More
White Papers & Webcasts
In just the last three years, Global 2000 executives have had to navigate their businesses through a pandemic, a geopolitical conflict, and a period of economic uncertainty. That
Read More
White Papers & Webcasts
Global Ransomware Survey Results Report The battle against ransomware in 2024 requires a comprehensive and multi-layered defense strategy. In the past year, ransomware adopted a more insidious approach,
Read More
White Papers & Webcasts
The Rapid7 MDR Buyer’s Guide takes a look at the key aspects of an MDR solution and helps you determine what’s most important to you during your own
Read More
White Papers & Webcasts
This report presents data and insights that security practitioners can use to better understand and guard against some of the most significant attacks and TTPs occurring in today’s
Read More