Okta Workforce Identity Questions
Nov 11 2022
What do you like most about Okta Workforce Identity?
Thanks for sharing your thoughts with the community!
Nov 11 2022
We all know it's really hard to get good pricing and cost information.
Please share what you can so you can help your peers.
Nov 11 2022
Please share with the community what you think needs improvement with Okta Workforce Identity.
What are its weaknesses? What would you like to see changed in a future version?
Nov 11 2022
How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
Nov 11 2022
If you were talking to someone whose organization is considering Okta Workforce Identity, what would you say?
How would you rate it and why? Any other tips or advice?
Identity and Access Management as a Service (IDaaS) (IAMaaS) Questions
Jul 13 2022
Hi security professionals,
Can you please clarify the definition of the Zero Trust vs Least Privileged model? How are they different?
In which cases you'd use each of them? Please share an example.
Thanks for sharing your knowledge!
Hi infosec professionals,
Can you share your best practices and advice to follow (by an enterprise) when implementing IAM in the Cloud?
Thanks for your help in educating our community!
Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?
I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.
I appreciate the help!
How do you practically use it and apply Security Posture/Security Posture Management in a large organization?
Which is the best Privileged Account Management solution for an enterprise? Why?
How is the privileged account management solution deployed? Can it work on-premises or in the cloud in physical or virtual environments, hosted on Windows or Linux OS?
When should an organization use Hybrid Identity? What are the top IAM tools that support it?
Hello everyone, We are working with an retail client based in the US. Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc). We integrate with a host of external vendor products such as Payment Ga... Read More »
How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile? Read More »
What tools do you use to make your remote work efficient? Providing use cases along with the pros & cons of the tools would also be beneficial for the community.
Thanks for sharing your experience!
Is there a good comparison (matrix) for Microsoft Identity Manager vs any identity and access management solutions?
Hi community members,
I'm researching identity management/identity and access management solutions.
Are there any good comparison matrices comparing Microsoft Identity Manager to other identity and access management solutions?
Thanks in advance,
What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?
What tools can be used to help make GDPR compliance easier? What are some specific features to look out for?
What are pros and cons of each?
SSO seems like a great way to simplify secure user authentication, but is it safe? If SSO is compromised, surely this poses a greater risk, as then all one's passwords can be accessed across all applications?
Download our free Okta Workforce Identity Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2022
Product CategoriesIdentity and Access Management as a Service (IDaaS) (IAMaaS) Access Management ZTNA as a Service
- Looking for an Identity and Access Management product for an energy and utility organization
- Is SSO safe?
- Which is the best Privileged Account Management solution?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- Why is identity and access management (IAM) so important in preventing data breaches?
- What access management tools would you recommend to help with GDPR compliance?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
- What are the differences between LDAP and Active Directory?
- How is Zero Trust different from the Least Privileged model?
- What is the difference between IDAM , PIM and PAM?